Cryptography Reference
In-Depth Information
Client 1
Server 1
K CA
p
K p
K CA
p
K p
Authority
Client 2
Server 2
K CA
p
K p
Client 3
Server 3
Figure 12.2. Critical secure channels when using certificates.
12.2
SSH: Secure Shell
SSH (as for “Secure SHell”) was originally made to enable remote access to a computer
in a secure way under UNIX-like operating systems. It was made to be used just like the
rlogin command (remote login). There is now a series of commercial applications
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 212 (0xd4)
Signature Algorithm: md5WithRSAEncryption
Issuer:
C=CH, ST=Vaud, L=Lausanne, O=EPFL,
CN=EPFL Certification Authority/Email=cert-auth@epfl.ch
Validity
Not Before: Jul 11 09:42:05 2002 GMT
Not After : Jul 11 09:42:05 2003 GMT
...
Signature Algorithm: md5WithRSAEncryption
a2:ae:a1:b0:f0:24:47:ca:29:b8:78:a6:58:7d:62:3e:25:c9:
e6:c8:f7:58:99:18:ab:f5:ed:e7:74:7f:a9:4b:5f:07:e3:80:
a4:68:ea:0a:d2:8f:bb:b7:cc:cc:85:81:d0:15:4a:ee:7e:74:
f3:be:49:73:bc:4a:ab:22:4e:86:c6:9b:97:d7:4d:16:05:5c:
69:14:b6:10:36:da:70:64:50:23:4a:33:4c:fe:33:ca:3a:4e:
cb:c5:9b:28:be:df:b8:30:e7:07:13:d7:e2:88:b2:c2:af:19:
28:53:7d:39:37:d1:7c:c7:0b:10:3d:12:9d:15:8d:38:dd:6a:
06:55
Figure 12.3. Certificate for a secure IMAP server (overall structure).
Search WWH ::




Custom Search