Configuring Settings for Key Pairs and Digital
Certificates
167A-04U
In order to encrypt communication with a remote device, an encryption key must be sent and received over an
unsecured network beforehand. This problem is solved by public-key cryptography. Public-key cryptography ensures
secure communication by protecting important and valuable information from attacks, such as sniffing, spoofing, and
tampering of data as it flows over a network.
Key Pair
A key pair consists of a public key and a secret key, both of which are required for encrypting or
decrypting data. Because data that has been encrypted with one of the key pair cannot be
returned to its original data form without the other, public-key cryptography ensures secure
communication of data over the network. Up to eight key pairs, including the preinstalled pairs,
can be registered ( Using CA-issued Key Pairs and Digital Certificates(P. 319) ). For TLS
encrypted communication, a key pair can be generated for the machine ( Generating Key
Pairs(P. 310) ).
CA Certificate
Digital certificates including CA certificates are similar to other forms of identification, such as
driver's licenses. A digital certificate contains a digital signature, which enables the machine to
detect any spoofing or tampering of data. It is extremely difficult for third parties to abuse
digital certificates. A digital certificate that contains a public key of a certification authority (CA)
is referred to as a CA certificate. CA certificates are used for verifying the device the machine is
communicating with for features such as printing with Google Cloud Print or IEEE 802.1X
authentication. Up to 150 CA certificates can be registered, including the 72 certificates that are
preinstalled in the machine ( Using CA-issued Key Pairs and Digital Certificates(P. 319) ).
◼
Key and Certificate Requirements
The certificate contained in a key pair generated with the machine conforms to X.509v3. If you install a key pair or a CA
certificate from a computer, make sure that they meet the following requirements:
Format
●
Key pair: PKCS#12
*1
●
CA certificate:
X.509v1 DER (encoded binary)
X.509v3 DER (encoded binary)
File extension
●
Key pair: ".p12" or ".pfx"
●
CA certificate: ".cer"
Public key algorithm
(and key length)
●
Key Pair:
RSA (512 bits
*2
, 1024 bits, 2048 bits, 4096 bits)
ECDSA (P256, P384, P521)
●
CA Certificate:
RSA (512 bits
*2
, 1024 bits, 2048 bits, 4096 bits)
*1
Requirements for the certificate contained in a key pair are pursuant to CA certificates.
*2
Not supported when the operating system of the device the machine communicates with is Windows 8/10/Server 2012.
Encrypted communication may also be unavailable with other Windows versions depending on the program update status.
*3
SHA384-RSA and SHA512-RSA are available only when the RSA key length is 1024 bits or more.
Security
308
Summary of Contents for LBP312 SERIES
Page 1: ...LBP312x User s Guide USRMA 1622 00 2017 01 en Copyright CANON INC 2016 ...
Page 51: ...LINKS Paper P 558 Basic Operations 45 ...
Page 58: ...4 on 1 Postcard Insert the postcard with the upper end toward the machine Basic Operations 52 ...
Page 78: ...Printing a Document 72 ...
Page 93: ...LINKS Basic Printing Operations P 73 Printing a Document 87 ...
Page 97: ...LINKS Basic Printing Operations P 73 Enlarging or Reducing P 82 Printing a Document 91 ...
Page 106: ...LINKS Basic Printing Operations P 73 Printing a Document 100 ...
Page 158: ...LINKS Printing without Opening a File Direct Print P 142 Printing a Document 152 ...
Page 188: ...LINKS Connecting to a Network P 179 Network 182 ...
Page 240: ...LINKS Entering Sleep Mode P 63 Network 234 ...
Page 280: ...Printing a Document Stored in the Machine Stored Job Print P 133 Security 274 ...
Page 286: ... Functions of the Keys Operation Panel P 24 Security 280 ...
Page 324: ...Using TLS for Encrypted Communications P 287 Configuring IPSec Settings P 291 Security 318 ...
Page 334: ...Using Remote UI 328 ...
Page 347: ...LINKS Remote UI Screens P 329 Using Remote UI 341 ...
Page 350: ...LINKS Remote UI Screens P 329 Using Remote UI 344 ...
Page 374: ...Paper Source 167A 05E See Select Feeder Menu P 450 Setting Menu List 368 ...
Page 465: ...Troubleshooting 459 ...
Page 550: ...Third Party Software 167A 07F Appendix 544 ...
Page 559: ...For more information about this function see Collating Printouts by Page P 86 Appendix 553 ...
Page 611: ...Scalable Fonts PCL Appendix 605 ...
Page 612: ...Appendix 606 ...
Page 613: ...Appendix 607 ...
Page 614: ...OCR Code Scalable Fonts PCL Bitmapped Fonts PCL Appendix 608 ...
Page 637: ... 17 MD4 RSA Data Security Inc MD4 Message Digest Algorithm ...
Page 651: ... 31 Department s Table of Denial Orders ...
Page 667: ... 47 signature of Ty Coon 1 April 1990 Ty Coon President of Vice That s all there is to it ...
Page 688: ...Search Enter keyword s here 1 ...
Page 691: ...Procedure Necessary Steps Reference Page Start the MEAP applications from SMS 2 ...
Page 701: ...12 ...
Page 707: ...3 Click Delivered Update 4 Click Apply Firmware 5 Confirm the firmware to apply click Yes 5 ...
Page 709: ...3 Click Delivered Update 4 Click Delete Firmware 7 ...
Page 728: ...Search Enter keyword s here 1 ...
Page 749: ...Starting MEAP Applications Stopping MEAP Applications Starting Stopping MEAP Applications 10 ...
Page 757: ...4 Click License Management 18 ...
Page 760: ...4 Click License Management 21 ...
Page 761: ...5 Click Disable 6 Click Yes The license file is disabled 22 ...
Page 763: ...4 Click License Management 24 ...
Page 766: ...4 Click License Management 27 ...
Page 767: ...5 Click Delete 6 Click Yes The license file is deleted 28 ...
Page 768: ...29 ...
Page 770: ...4 Click Authentication Information Settings 31 ...
Page 772: ...IMPORTANT When cancelling authentication information Click Delete 33 ...
Page 777: ...5 ...
Page 786: ...14 ...
Page 789: ...17 ...
Page 795: ...4 Click Yes The setting information of the application is deleted 23 ...