Certificate Authorities - ZyXEL Communications MAX-306M1 User Manual

Max-306m1 series wimax mimo outdoor simple cpe
Table of Contents

Advertisement

Chapter 15 The Certificates Screens

15.4.1 Certificate Authorities

When using public-key cryptology for authentication, each host has two keys. One
key is public and can be made openly available. The other key is private and must
be kept secure.
These keys work like a handwritten signature (in fact, certificates are often
referred to as "digital signatures"). Only you can write your signature exactly as it
ought to look. When people know what your signature ought to look like, they can
verify whether something was signed by you, or by someone else. In the same
way, your private key "writes" your digital signature and your public key allows
people to verify whether data was signed by you, or by someone else. This
process works as follows.
Tim wants to send a message to Jenny. He needs her to be sure that it comes
1
from him, and that the message content has not been altered by anyone else
along the way. Tim generates a public key pair (one public key and one private
key).
Tim keeps the private key and makes the public key openly available. This means
2
that anyone who receives a message seeming to come from Tim can read it and
verify whether it is really from him or not.
Tim uses his private key to sign the message and sends it to Jenny.
3
Jenny receives the message and uses Tim's public key to verify it. Jenny knows
4
that the message is from Tim, and she knows that although other people may
have been able to read the message, no-one can have altered it (because they
cannot re-sign the message with Tim's private key).
Additionally, Jenny uses her own private key to sign a message and Tim uses
5
Jenny's public key to verify the message.
The WiMAX Modem uses certificates based on public-key cryptology to
authenticate users attempting to establish a connection, not to encrypt the data
that you send after establishing a connection. The method used to secure the data
that you send through an established connection depends on the type of
connection. For example, a VPN tunnel might use the triple DES encryption
algorithm.
The certification authority uses its private key to sign certificates. Anyone can
then use the certification authority's public key to verify the certificates.
A certification path is the hierarchy of certification authority certificates that
validate a certificate. The WiMAX Modem does not trust a certificate if any
certificate on its path has expired or been revoked.
184
User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Max-316m1

Table of Contents