Create

Jack’s Public Key

Key Pair

Jack

 

 

Jack’s Private Key

Identity Info +

Jack’s Private Key

(Stays Private)

 

Jack

 

Jack’s Public Key

 

Identity Info +

Jack’s Public Key

Preliminary Certificate

One-Way Function/Hash Function

Identity Info +

Jack’s Public Key

Encryption

Digital Signature

Jack’s self-signed

Certificate

Figure 21 - Self-Signed Certificate

Basically, Jack’s private key does the signing on his public key certificate. A root (top of the chain) certificate authority is going to go through the same process. So why is it okay for a Root CA to have a self-signed certificate but no one else to have one? Well, it is all about trust. There is no “higher” level of trust then the top level certificate authority. Therefore, in our previous examples, John and Jack must choose a particular certificate authority that they both trust. In most cases, there is a hierarchy of certificate authorities at customer sites. This forms what is known as a certificate chain and there is a top level CA or Root CA where the ultimate trust resides.

Also, we should take care to point out that there is usually a difference between Internet trust using certificates and Intranet trust using certificates. Internet trust will involve well-known certificate authorities like Verisign and Entrust. However, Intranet models usually revolve around Microsoft’s certificate authority that comes with Windows 2003 server. Each company establishes their own Public Key Infrastructure (PKI) that includes an entire policy around certificates.

There is one other important thing to cover about certificates. Each certificate has a one or more “certificate purposes” that the certificate can be used for. For example, a Jetdirect self-signed certificate will have two purposes: client authentication and server authentication. A root certificate

19