Certificates Technical Reference; Certificates Overview; Private-Public Certificates - ZyXEL Communications P-660HW-Tx v3 Series User Manual

802.11g wireless adsl2+ 4-port gateway
Hide thumbs Also See for P-660HW-Tx v3 Series:
Table of Contents

Advertisement

13.3 Certificates Technical Reference

This section provides technical background information about the topics covered in
this chapter.

13.3.1 Certificates Overview

The ZyXEL Device can use certificates (also called digital IDs) to authenticate
users. Certificates are based on public-private key pairs. A certificate contains the
certificate owner's identity and public key. Certificates provide a way to exchange
public keys for use in authentication.
The ZyXEL Device uses certificates based on public-key cryptology to authenticate
users attempting to establish a connection, not to encrypt the data that you send
after establishing a connection. The method used to secure the data that you send
through an established connection depends on the type of connection. For
example, a VPN tunnel might use the triple DES encryption algorithm.
The certification authority uses its private key to sign certificates. Anyone can then
use the certification authority's public key to verify the certificates.
Advantages of Certificates
Certificates offer the following benefits.
• The ZyXEL Device only has to store the certificates of the certification
authorities that you decide to trust, no matter how many devices you need to
authenticate.
• Key distribution is simple and very secure since you can freely distribute public
keys and you never need to transmit private keys.

13.3.2 Private-Public Certificates

When using public-key cryptology for authentication, each host has two keys. One
key is public and can be made openly available. The other key is private and must
be kept secure.
These keys work like a handwritten signature (in fact, certificates are often
referred to as "digital signatures"). Only you can write your signature exactly as it
should look. When people know what your signature looks like, they can verify
whether something was signed by you, or by someone else. In the same way, your
private key "writes" your digital signature and your public key allows people to
verify whether data was signed by you, or by someone else. This process works as
follows.
P-660HW-Tx v3 Series User's Guide
Chapter 13 Certificates
235

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-660hw-t1 v3P-660hw-t3 v3P-660hw-tx

Table of Contents