日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

Key usage extensions and extended key usage

發布時間:2025/3/20 编程问答 30 豆豆
生活随笔 收集整理的這篇文章主要介紹了 Key usage extensions and extended key usage 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

轉載自IBM的一篇文章

http://publib.boulder.ibm.com/infocenter/domhelp/v8r0/index.jsp?topic=%2Fcom.ibm.help.domino.admin.doc%2FDOC%2FH_KEY_USAGE_EXTENSIONS_FOR_INTERNET_CERTIFICATES_1521_OVER.html

Key usage extensions and extended key usage

Key usage extensions

Key usage extensions define the purpose of the public key contained in a certificate. You can use them to restrict the public key to as few or as many operations as needed. For example, if you have a key used only for signing or verifying a signature, enable the digital signature and/or non-repudiation extensions. Alternatively, if a key is used only for key management, enable key encipherment.

The following table describes the key usage extensions available for certificates created using the CA process.

Note?The digital signature and data encipherment key usage extensions are enabled by default for all Internet certificates.

Key usage extension

Description

Digital signature

Use when the public key is used with a digital signature mechanism to support security services other than non-repudiation, certificate signing, or CRL signing. A digital signature is often used for entity authentication and data origin authentication with integrity.

Non-repudiation

Use when the public key is used to verify digital signatures used to provide a non-repudiation service. Non-repudiation protects against the signing entity falsely denying some action (excluding certificate or CRL signing).

Key encipherment

Use when a certificate will be used with a protocol that encrypts keys. An example is S/MIME enveloping, where a fast (symmetric) key is encrypted with the public key from the certificate. SSL protocol also performs key encipherment.

Data encipherment

Use when the public key is used for encrypting user data, other than cryptographic keys.

Key agreement

Use when the sender and receiver of the public key need to derive the key without using encryption. This key can then can be used to encrypt messages between the sender and receiver. Key agreement is typically used with Diffie-Hellman ciphers.

Certificate signing

Use when the subject public key is used to verify a signature on certificates. This extension can be used only in CA certificates.

CRL signing

Use when the subject public key is to verify a signature on revocation information, such as a CRL.

Encipher only

Use only when key agreement is also enabled. This enables the public key to be used only for enciphering data while performing key agreement.

Decipher only

Use only when key agreement is also enabled. This enables the public key to be used only for deciphering data while performing key agreement.

Extended key usage

Extended key usage further refines key usage extensions. An extended key is either critical or non-critical. If the extension is critical, the certificate?must?be used only for the indicated purpose or purposes. If the certificate is used for another purpose, it is in violation of the CA's policy.

If the extension is non-critical, it indicates the intended purpose or purposes of the key and may be used in finding the correct key/certificate of an entity that has multiple keys/certificates. The extension is then only an informational field and does not imply that the CA restricts use of the key to the purpose indicated. Nevertheless, applications that use certificates may require that a particular purpose be indicated in order for the certificate to be acceptable.

If a certificate contains both a critical key usage field and a critical extended key usage field, both fields?mustbe processed independently, and the certificate be used only for a purpose consistent with both fields. If there is no purpose consistent with both fields, the certificate must?not?be used for any purpose.

Extended key

Enable for these key usage extensions

TLS Web server authentication

Digital signature, key encipherment or key agreement

TLS Web client authentication

Digital signature and/or key agreement

Sign (downloadable) executable code

Digital signature

Email protection

Digital signature, non-repudiation, and/or key encipherment or key agreement

IPSEC End System (host or router)

Digital signature and/or key encipherment or key agreement

IPSEC Tunnel

Digital signature and/or key encipherment or key agreement

IPSEC User

Digital signature and/or key encipherment or key agreement

Timestamping

Digital signature, non-repudiation.

Examples of required key usage extensions

Application

Required key usage extensions

SSL Client

Digital signature

SSL Server

Key encipherment

S/MIME Signing

Digital signature

S/MIME Encryption

Key encipherment

Certificate Signing

Certificate signing

Object Signing

Digital signature

總結

以上是生活随笔為你收集整理的Key usage extensions and extended key usage的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。