Chapter 12 Certificate Screen
ZyXEL NWA-1100 User’s Guide
113
12.5 Technical Reference
This section provides technical background information about the topics covered in
this chapter.
12.5.1 Private-Public Certificates
When using public-key cryptology for authentication, each host has two keys. One
key is public and can be made openly available. The other key is private and must
be kept secure.
These keys work like a handwritten signature (in fact, certificates are often
referred to as “digital signatures”). Only you can write your signature exactly as it
should look. When people know what your signature looks like, they can verify
whether something was signed by you, or by someone else. In the same way, your
private key “writes” your digital signature and your public key allows people to
verify whether data was signed by you, or by someone else. This process works as
follows.
1
Tim wants to send a message to Jenny. He needs her to be sure that it comes from
him, and that the message content has not been altered by anyone else along the
way. Tim generates a public key pair (one public key and one private key).
2
Tim keeps the private key and makes the public key openly available. This means
that anyone who receives a message seeming to come from Tim can read it and
verify whether it is really from him or not.
3
Tim uses his private key to sign the message and sends it to Jenny.
4
Jenny receives the message and uses Tim’s public key to verify it. Jenny knows
that the message is from Tim, and that although other people may have been able
to read the message, no-one can have altered it (because they cannot re-sign the
message with Tim’s private key).
5
Additionally, Jenny uses her own private key to sign a message and Tim uses
Jenny’s public key to verify the message.
12.5.2 Certification Authorities
A Certification Authority (CA) issues certificates and guarantees the identity of
each certificate owner. There are commercial certification authorities like
CyberTrust or VeriSign and government certification authorities. You can use the
ZyXEL Device to generate certification requests that contain identifying
information and public keys and then send the certification requests to a
certification authority.
Содержание NWA-1100
Страница 2: ......
Страница 8: ...Safety Warnings ZyXEL NWA 1100 User s Guide 8 ...
Страница 10: ...Contents Overview ZyXEL NWA 1100 User s Guide 10 ...
Страница 16: ...Table of Contents ZyXEL NWA 1100 User s Guide 16 ...
Страница 18: ...18 ...
Страница 32: ...Chapter 2 Introducing the Web Configurator ZyXEL NWA 1100 User s Guide 32 ...
Страница 46: ...46 ...
Страница 54: ...Chapter 5 System Screens ZyXEL NWA 1100 User s Guide 54 ...
Страница 72: ...Chapter 6 Wireless Settings Screen ZyXEL NWA 1100 User s Guide 72 ...
Страница 92: ...Chapter 8 RADIUS Screen ZyXEL NWA 1100 User s Guide 92 ...
Страница 96: ...Chapter 9 MAC Filter Screen ZyXEL NWA 1100 User s Guide 96 ...
Страница 100: ...Chapter 10 IP Screen ZyXEL NWA 1100 User s Guide 100 ...
Страница 136: ...Chapter 15 Troubleshooting ZyXEL NWA 1100 User s Guide 136 ...
Страница 138: ...138 ...
Страница 142: ...Appendix B Power over Ethernet PoE Specifications ZyXEL NWA 1100 User s Guide 142 ...
Страница 144: ...Appendix C Power Adaptor Specifications ZyXEL NWA 1100 User s Guide 144 ...
Страница 198: ...Appendix H Text File Based Auto Configuration ZyXEL NWA 1100 User s Guide 198 ...
Страница 214: ...Appendix J Open Software Announcements ZyWALL USG 300 User s Guide 214 ...
Страница 225: ...Index ZyXEL NWA 1100 User s Guide 225 ...