Foundations of Network and Computer Security
SSH (A Different Model)
SSH: Typical Solution
Key Fingerprints
X. 509 Certificates
Project #1
What does secret key look like?
Open. SSL RSA Private Key
But Notice no Password!
What does key look like now?
CSR: Certificate Request
Creating a CSR
Viewing a CSR
CSRs
Sample Certificate
Viewing a Certificate
What have we Accomplished?
CA’s Verification Key is a Cert!
My Root Cert -----BEGIN CERTIFICATE----MIICkj. CCAfug. Aw. IBAg. IJAJk. QJeqat 8 EHMA 0 GCSq. GSIb 3 DQEBBAUAMIGBMRAw. Dg. YD VQQDEwd. Kb 2 hu. IENBMREw. Dw. YDVQQIEwh. Db 2 xvcm. Fkbz. ELMAk. GA 1 UEBh. MCVVMx. Jj. Ak Bgkqhki. G 9 w 0 BCQEWF 2 py. Ymxh. Y 2 t. AY 3 Mu. Y 29 sb 3 Jh. ZG 8 u. ZWR 1 MSUw. Iw. YDVQQKExx. S b 290 IENlcn. Rp. Zmlj. YXRpb 24 g. QXV 0 a. G 9 ya. XR 5 MB 4 XDTA 5 MTAw. NTE 3 NTg 1 M 1 o. XDTEw MTAw. NTE 3 NTg 1 M 1 owg. YEx. EDAOBg. NVBAMTB 0 pva. G 4 g. Q 0 Ex. ETAPBg. NVBAg. TCENvb. G 9 y YWRv. MQsw. CQYDVQQGEw. JVUz. Em. MCQGCSq. GSIb 3 DQEJARYXan. Jib. GFja 0 Bjcy 5 jb 2 xv cm. Fkby 5 l. ZHUx. JTAj. Bg. NVBAo. THFJvb 3 Qg. Q 2 Vyd. Glma. WNhd. Glvbi. BBd. XRob 3 Jpd. Hkw g. Z 8 w. DQYJKo. ZIhvc. NAQEBBQADg. Y 0 AMIGJAo. GBAK 7 d. KVblnjz 73 FRZ+N 5 Vy 5 FVA 9 Q 4 q/k. Aoy. WWo. Rz. I 8 a. N 97 HUu. Ov. CPu. Xo. Mevl. TJkkpm. DXXF 2 fycy. DGY 2 qz. NWS 7 PTG 0 qk. CG ZF/5 ULH 3 Pn. JJau 2 KPcd. XIa. Q 6 r 0 Sqwz. Cb. VS 4 K 6 RGGk 52 b. Raxvf. Pe. Brh. Dhhlge. Zz. PG IRPCq. IV 43 DHGw. FYh. Ag. MBAAGj. EDAOMAw. GA 1 Ud. Ew. QFMAMBAf 8 w. DQYJKo. ZIhvc. NAQEE BQADg. YEAp. F 8 fqdzv 5 w 9 Lu. Iehc. B+m 8 C/d. Ebp. GOSm+sg. Th. Ds. Rp. WGele. Xs/szs 29 G 1 V 48 KG 9 ux. CRz 2 j. Tkj 8 pe. PUdp 8 Cs. G 5 yw. Udigx 1 qk. TRl+Vjy 7 q. PPl. Pv. GRHbql/fi/o. AH Rtst. VRjmjq. KIG 3 h. EZJHghow. CC+4 ibfw 2 jg. PVt. Cg. Lkh. R 713 u. Rim 8= -----END CERTIFICATE-----
Distributing the Root Cert
Root Cert Fingerprint
Overall Idea of the Project
Sample Message from A to B