
Configuring Settings for Key Pairs and Digital
Certificates
19Y4-051
In order to encrypt communication with a remote device, an encryption key must be sent and received over an
unsecured network beforehand. This problem is solved by public-key cryptography. Public-key cryptography ensures
secure communication by protecting important and valuable information from attacks, such as sniffing, spoofing, and
tampering of data as it flows over a network.
Key Pair
A key pair consists of a public key and a secret key, both of which are required for encrypting or
decrypting data. Because data that has been encrypted with one of the key pair cannot be
returned to its original data form without the other, public-key cryptography ensures secure
communication of data over the network. A key pair is used for TLS encrypted communication
or TLS of the IEEE 802.1X authentication. Up to five key pairs (including the preinstalled pairs)
can be generated to the machine ( Using CA-issued Key Pairs and Digital
Certificates(P. 259) ). A key pair can be generated with the machine ( Generating Key
Pairs(P. 252) ).
CA Certificate
Digital certificates including CA certificates are similar to other forms of identification, such as
driver's licenses. A digital certificate contains a digital signature, which enables the machine to
detect any spoofing or tampering of data. It is extremely difficult for third parties to abuse
digital certificates. A digital certificate that contains a public key of a certification authority (CA)
is referred to as a CA certificate. CA certificates are used for verifying the device the machine is
communicating with for features such as printing with Google Cloud Print or IEEE 802.1X
authentication. Up to 67 CA certificates can be registered, including the 62 certificates that are
preinstalled in the machine ( Using CA-issued Key Pairs and Digital Certificates(P. 259) ).
◼
Key and Certificate Requirements
The certificate contained in a key pair generated with the machine conforms to X.509v3. If you install a key pair or a CA
certificate from a computer, make sure that they meet the following requirements:
Format
●
Key pair: PKCS#12
*1
●
CA certificate: X.509v1 or X.509v3, DER (encoded binary), PEM
File extension
●
Key pair: ".p12" or ".pfx"
●
CA certificate: ".cer"
Public key algorithm
(and key length)
RSA (512 bits, 1024 bits, 2048 bits, or 4096 bits)
Certificate signature algorithm
SHA1-RSA, SHA256-RSA, SHA384-RSA
*2
, SHA512-RSA
*2
, MD5-RSA, or MD2-RSA
Certificate thumbprint algorithm SHA1
*1
Requirements for the certificate contained in a key pair are pursuant to CA certificates.
*2
SHA384-RSA and SHA512-RSA are available only when the RSA key length is 1024 bits or more.
Security
250
Содержание 1418C025
Страница 1: ...imageCLASS D570 User s Guide USRMA 1576 00 2017 01 en Copyright CANON INC 2017 ...
Страница 31: ... key Press to switch the type of text that is entered LINKS Using the Operation Panel P 29 Basic Operations 25 ...
Страница 60: ...Exiting Sleep Mode Press You can also press any key other than to exit sleep mode Basic Operations 54 ...
Страница 73: ...LINKS Basic Copy Operations P 58 Adjusting Density P 65 Copying 67 ...
Страница 77: ...LINKS Basic Copy Operations P 58 2 Sided Copying P 68 Using the Paper Save Copy Key P 72 Copying 71 ...
Страница 89: ...Managing Documents and Checking the Machine Status P 271 Using the Machine as a Printer 83 ...
Страница 110: ...LINKS Printing a Document P 80 Printing Borders P 102 Printing Watermarks P 105 Using the Machine as a Printer 104 ...
Страница 125: ...LINKS Printing a Document P 80 Various Print Settings P 88 Using the Machine as a Printer 119 ...
Страница 191: ...4 Click Edit in IPv6 Settings 5 Select the Use IPv6 check box and configure the required settings Use IPv6 Network 185 ...
Страница 241: ...Configuring Printer Ports P 194 Security 235 ...
Страница 257: ... The machine does not support use of a certificate revocation list CRL Security 251 ...
Страница 280: ...LINKS Remote UI Screens P 268 Using Remote UI 274 ...
Страница 307: ... Timer Settings Auto Offline Time Set the time period Setting Menu List 301 ...
Страница 339: ...Troubleshooting 333 ...
Страница 398: ...Third Party Software 19Y4 072 For information related to third party software click the following icon Appendix 392 ...
Страница 427: ...Manual Display Settings 19Y4 07X Appendix 421 ...
Страница 437: ...Appendix 431 ...
Страница 438: ...Menu Route Map 19Y4 081 For the settings on the machine s display see Menu Route Map PDF manual Appendix 432 ...
Страница 455: ... 12 JPEG this software is based in part on the work of the Independent JPEG Group ...