Glossary
Page 142 of 147
TAINY iQ
X.509 certificate
A type of "seal" which verifies the authenticity of the public key (
asymmetric encryption) and corresponding data.
The possibility of certification exists so that the user of the public key (used
for encryption) can be certain that the public key really originates from its
actual originator and thus from the party who was intended to receive the
data to be sent. A certification authority (CA) checks the authenticity of the
public key and the associated linking of the originator’s identity with its key.
This takes place according to the CA’s rules, which may require the
originator of the public key to appear in person. After a successful check, the
CA signs the public key with its (digital) signature. A certificate is created.
X.509 (v3) certificate thus contains a public key, information about the owner
of the key (specified by distinguished name [DN]), allowed purposes of use,
etc. and the signature of the CA.
The signature is created as follows: The CA creates an individual bit
sequence up to 160 bits long known as the HASH value from the public
key’s bit sequence, the data on its owner and from additional data. The CA
encrypts this with its private key and adds the certificate. Encryption with the
CA’s private key verifies authenticity, meaning that the encrypted HASH
character sequence is the CA’s digital signature. If the data of the certificate
appears to have been manipulated, this HASH value will no longer be
correct and the certificate will be worthless.
The HASH value is also referred to as a fingerprint. Since it is encrypted with
the CA’s private key, anyone who has the appropriate public key can encrypt
the bit sequence and thus check the authenticity of this fingerprint or this
signature.
By using the services of authentication authorities, it is possible that one key
owner need not know the other, only the authentication authority. The
additional information for the key also simplifies the administrative efforts for
the key.
X.509 certificates are used for email encryption, etc. using S/MIME or IPsec.
Additional Internal
Routes
The following sketch shows how the IP addresses could be distributed in a
local network with subnetworks as well as the kind of network addresses
resulting from this, and how the specification for an additional internal route
could look like.
Summary of Contents for TAINY IQ-LTE
Page 1: ...TAINY IQ LTE User Manual ...