Introduction To Ip Security In Ip-Dect - Avaya DECT R4 Installation And Administration Manual

Hide thumbs Also See for DECT R4:
Table of Contents

Advertisement

Certificate Authorities
A Certificate Authority or Certification Authority (CA) is a trusted entity that issues public key
certificates. The certificates contain a public key and the identity of the owner. The CA asserts
that the public key belongs to the owner, so that users and relying parties can trust the
information in the certificate.
Certificate Signing Request (CSR) or Certification Request is a message that is generated
and sent to a CA in order to apply for a TLS certificate. Before the CSR is created, a key pair is
generated and the private key kept secret.
The CSR will contain the corresponding public key and information identifying the applicant
such as distinguished name. The private key is not part of the CSR but is used to digitally sign
the entire request. Other credentials may accompany the CSR.
If the request is successful, the CA will send back an identity certificate that has been digitally
signed with the CA's private key.
A CSR is valid for the server where the certificate will be installed.
Cryptography
Cryptography is the encoding of messages to render the messages unreadable by anyone
other than their intended recipient or recipients. Modern cryptography uses complex algorithms
implemented on modern computer systems.
Cryptography is divided into the two general categories: Encryption and Authentication.
Encryption
Encryption is the scrambling of information so that unauthorized recipients cannot determine
the original message by applying an encryption algorithm to the message plaintext producing
ciphertext, or apparently random bits. With the correct key, a decryption algorithm converts the
ciphertext back into plaintext. Public key algorithms use paired keys, one for encryption and the
other for decryption.
Authentication
Authentication is the verification of a sender of a message. Authentication requires the message
to be protected so it cannot be altered, usually by generating a digital signature formed by a
hash of the message. Only the correct key can generate a valid signature.

Introduction to IP Security in IP-DECT

A secure system requires more planning than an unsecured system.
Avaya DECT R4 - Installation and Maintenance Guide
IP security
77
02/2016

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents