Label: style blog http io color ar OSIn cryptography, CA (Certificate Authority) refers to an organization trusted by multiple users, which can create and assign public key certificates.For the sake of standardization, we will first introduce the terms that may be involved in this article,Asypolicric cryptography: asymmetric cryptography (or public key encryption and public key encryption). A key involves a key pair consisting of a public key and a pr
Self-built CA Based on OpenSSL and SSL certificate issuance
For details about SSL/TLS, see the SSL/TLS principles.For more information about Certificate Authority (CA) and digital certificate, see OpenSSL and SSL digital certificate concepts.
Openssl is a suite of open-source programs. It consists of three parts: one islibcryto, This is a general function of the encryption library, which implements a large
Transferred from:
Http://rhythm-zju.blog.163.com/blog/static/310042008015115718637/
All rights reserved. If you need to reprint it, please indicate the source
I have studied SSL/TLS some time ago and read the English version of Eric rescorla's SSL and TLS-designing and building secure systems (for the severity of the Chinese version, I wrote a previous articleBlog has been severely criticized ). The author of this book follows the idea of Steven s in his role of TCP/IP authentication strated: us
ensure the privacy of the data ;3 . Decrypt the signature of the original data with the public key provided by Alice and verify the identity of the data sender Alice;4, using the same one-way encryption algorithm to calculate the original data signature and the decrypted signature to compare, ensure data integrity. In the process of data transmission, it is necessary for both parties to obtain the other's public key, that is, the key exchange, the public key in the network transmission process
This article mainly draws on and references the following 2 address content, then carries on the test and the execution on own machine, and has made the following record.RefHttp://blog.chinaunix.net/uid-26760055-id-3128132.htmlhttp://www.111cn.net/sys/linux/61591.htmCreate a Test CatalogMkdir/tmp/create_key/caCD /tmp/create_key/ certificate file generation:one. Server-side1. Generate the server-side private key (key file);OpenSSL genrsa-des3-out server.key 1024x768The runtime prompts for a passw
I. Theoretical knowledge
What is ca?
Ca is short for Certificate Authority. It is usually translated into an authentication authority or a certification center. It is mainly used to issue digital certificates to users. This digital certificate contains part of the user's identity information and the public key held by the user. At the same time, the private key of the
enter the following ' extra ' attributesTo is sent with your certificate requestA Challenge Password []: An optional company name []: #scp/ROOT/WEB.CSR S2:/root---CA Certification Body------> Sign the S1 signature request WEB.CSR issue generation WEB.CRTS2 is not a CA certification authority nowNeed to first deploy S2 as CA certification AuthorityDeploying
Objective
The CA is the issuing authority for the certificate, which is the core of the PKI. CA is the authority responsible for issuing certificates, certifying certificates, and administering issued certificates.It is to develop policies and specific steps to verify, identify, and sign user certificates to ensure that the identity of the certificate holder andOwnership of the public key.The
Windows 2003 AD Upgrade to Windows-Ad CA Server MigrationIn the previous blog post we showed you how to upgrade Windows 2003 AD to Windows AD and the migration of the upgraded DHCP server, and today we will continue to introduce you to Windows 2003 AD upgrade to Windows 2012 After the ad, the CA server is migrated. Okay, nonsense, we're starting to experiment:The original
Ca:certificate Authority, a certificate authority, also known as a certification authority or certification center, is a trusted third-party entity in a PKI. Responsible for several important tasks such as certificate management tasks such as certification issuance, revocation, update, and renewal, and CRL publishing and event logging. First, the principal issues the certificate request, typically, the principal generates the key pair, and sometimes the CA
Create a private CA server in LinuxWhat is a certificate?
It is used to prove that something is indeed something. In general, certificates are like official seals. The official seal proves that the relevant documents are indeed issued by the corresponding company.
In theory, everyone can find a certificate tool and create a certificate by themselves.What is CA?
CA
sender is actually Bob, which completes the authentication (the characteristic value of a string of data is obtained after decryption)The fourth step: using the same single encryption algorithm to extract the eigenvalues of this data, if the same as the third step of the eigenvalues, the data is complete, this completes the data integrity of the checksumAnother question is how Bob and Alice get the other's public key, or how to prove that the public key they get is the other. This requires the
, authenticity and storage control security issues, PKI system contains a certificate authority (CA), registration Center (RA), policy Management, key and certificate management, key backup and recovery, revocation system and other functional modules combined.650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/73/70/wKiom1X-C36wj_nxAAKck48VE3w837.jpg "title=" Qq20150920090711.png "alt=" Wkiom1x-c36wj_nxaakck48ve3w837.jpg "/>Third, SSLSecure Soc
In HTTPS learning note two, the concept of digital certificates has been clarified, composed and how the client validates the server-side certificate during the HTTPS connection process. This chapter describes how to use the OpenSSL library to create a key file, and to generate a root CA and issue a child certificate. Learn the main reference Official document: https://www.feistyduck.com/library/openssl-cookbook/online/ch-openssl.html#I. Introduction
I learned how to use OpenSSL in Linux over the past two days. OpenSSL is an open-source encryption tool. In Linux, we can use it to build a CA to issue certificates, encryption tools that can be used within an enterprise. Before introducing OpenSSL, first describe how to implement "Identity Authentication + Data Encryption.
For how to implement "Authentication + Data Encryption", please refer to the following flowchart (self-drawn, relatively simple)
: There is a security risk in the middle of a person is impersonating, while impersonating AB, then the middleman will be AB's information to read all over. To solve this problem, we have a third-party CA4.3 One-way encryption: Extract data Fingerprint (signature), can only encrypt, cannot decryptCharacteristics: fixed-length output, avalanche effect (small changes in initial results will result in a dramatic change in results)Function: Realize the integrity check of dataAlgorithm: Md5:message d
In a recent project, the establishment of the PKI system has not been completed before, so it was confused at the beginning. I slowly found out some results and shared them with you. I hope you can correct the incorrect information.
At present, the PKI system has become the key point of information security in an enterprise and is the pillar of information security. My project is based on Microsoft technology. The CA Certificate Server is a self-built
symmetric key with the public key of the receiver, attaches it to the tail of the cipher, and sends it; Decryption process: 1. The receiving party decrypts the encrypted symmetric password with its own private key; 2. The receiving Party uses the password to decrypt the text; 3, the receiver uses the sender's public key to decrypt the sender's private key encryption signature; 4, the receiver uses the same one-way encryption algorithm to calculate the original data signature; 5, the receiver co
by B and identity authentication is realized. (Assume that the decrypted signature is fcode)
(4) A uses the same one-way encryption algorithm to extract the signature of the received original message. Use this pattern to compare with the obtained fcode. If the same pattern is used, it indicates that the data of the original packet is complete.
Problem: the above method ensures data integrity, identity authentication, and data confidentiality. The public key of the other party must be used d
Fabric CA User's Guide
Certification Authority
The features provided are: identity registration : or connecting to LDAP (Lightweight Directory Access Protocol, Lightweight Directory Access Protocol) as a user registry; issuance of a registration certificate (ecerts) (Enrollment certificates) issuing Transaction certificate (tcerts) (Transaction certificates) : Provides anonymity and is not linked when trading on Hyperledger Fabric blockchain. renewal
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.