Trustis FPS PKI Glossary of Terms



Similar documents
TELSTRA RSS CA Subscriber Agreement (SA)

California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Danske Bank Group Certificate Policy

Certification Practice Statement

Act 7 Electronic Signatures Act 2011

Certipost Trust Services. Certificate Policy. for Lightweight Certificates for EUROCONTROL. Version 1.2. Effective date 03 May 2012

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

Internet Security Research Group (ISRG)

Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS)

Ericsson Group Certificate Value Statement

CMS Illinois Department of Central Management Services

Certification Practice Statement. Internet Security Research Group (ISRG)

Neutralus Certification Practices Statement

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

Guidelines Related To Electronic Communication And Use Of Secure Central Information Management Unit Office of the Prime Minister

ING Public Key Infrastructure Technical Certificate Policy

SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY

Land Registry. Version /09/2009. Certificate Policy

1 Definitions

Class 3 Registration Authority Charter

Certification Practice Statement (ANZ PKI)

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

ARTL PKI. Certificate Policy PKI Disclosure Statement

Government CA Government AA. Certification Practice Statement

CERTIFICATION PRACTICE STATEMENT UPDATE

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Vodafone Group CA Web Server Certificate Policy

Ford Motor Company CA Certification Practice Statement

TC TrustCenter GmbH Certification Practice Statement and Certificate Policy for Qualified Certificates

ETSI TR V1.1.1 ( )

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

Controller of Certification Authorities of Mauritius

HKUST CA. Certification Practice Statement

DoE CA. Certification Practice Statement. Digital Certification Procedures Statement 2.1.docx. Document ID

ING Public Key Infrastructure Certificate Practice Statement. Version June 2015

Trust Service Principles and Criteria for Certification Authorities

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

Comodo Certification Practice Statement

DigiCert Certification Practice Statement

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

X.509 Certificate Policy for India PKI

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

Citizen CA Certification Practice statement

CA Certificate Policy. SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT

Certificate Policy. SWIFT Qualified Certificates SWIFT

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT. Version 2.0

- X.509 PKI SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1

BUYPASS CLASS 3 SSL CERTIFICATES Effective date:

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

GlobalSign CA Certificate Policy

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

Equens Certificate Policy

RapidSSL Subscriber Agreement

Version 2.4 of April 25, 2008

TC TrustCenter GmbH. Certification Practice Statement

Metropolitan Police Service Enterprise PKI. Root Certificate Authority, Certificate Policy. Version th February 2012 NOT PROTECTIVELY MARKED

How To Understand And Understand The Certificate Authority (Ca)

Business Issues in the implementation of Digital signatures

SSL.com Certification Practice Statement

Statoil Policy Disclosure Statement

EuropeanSSL Secure Certification Practice Statement

Gandi CA Certification Practice Statement

Certificate Policy for OCES Employee Certificates (Public Certificates for Electronic Services) Version 5

Recommendation for Key Management Part 2: Best Practices for Key Management Organization

ETSI TS V1.4.3 ( )

"Certification Authority" means an entity which issues Certificates and performs all of the functions associated with issuing such Certificates.

Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2

CERTIFICATION PRACTICE STATEMENT. EV SSL CA Certification Practice Statement

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS Aristotle University of Thessaloniki PKI ( WHOM IT MAY CONCERN

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

CERTIFICATE POLICY KEYNECTIS SSL CA

LAWS OF BRUNEI CHAPTER 196 ELECTRONIC TRANSACTIONS ACT

Archived NIST Technical Series Publication

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States

epki Root Certification Authority Certification Practice Statement Version 1.2

Certification Practice Statement

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: version 1.2

WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing

Information Security

EBIZID CPS Certification Practice Statement

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE

VeriSign Trust Network Certificate Policies

Visa Public Key Infrastructure Certificate Policy (CP)

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

PEXA Public Key Infrastructure (PKI) PEXA Digital Signing Certificate Policy

Transcription:

Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate Authority (CA) System Certificate Authority Certificate (CA-Certificate) Certificate Authority Key (CA- Key) Certificate Discovery Certificate Manufacturer Private data, other than keys, that are required to access cryptographic modules. A system which generates and employs a secure key consisting of a Private Key for creating a Digital Signature and a Public Key to verify a Digital Signature. Also known as Public Key Cryptography. The process of establishing that individuals, organisations, or devices are who or what they claim to be. In the context of a PKI, authentication can be the process of establishing that an individual or organisation applying for or seeking access to something under a certain name is, in fact, the proper individual or organisation. Authentication can also refer to a security service that provides assurances that individuals, organisations, or things are who or what they claim to be or that a Message or other data originated from a specific individual, organisation, or device. Thus, it is said that a Digital Signature of a Message authenticates the Message's sender. A collection of data that at a minimum: 1. Identifies the Issuing Authority 2. Names or identifies its Subject 3. Contains the Subject's Public Key 4. Identifies the operational period of Certificate 5. Bears the Digital Signature of the Issuing Authority Also known as Digital Certificate The software and hardware system used by the Issuing Authority or it s designated Certificate Manufacturer to issue and manage the full lifecycle of certificates. See Issuing Authority Certificate. The Private Key used by the CA for signing Certificates and other objects. The process of obtaining a subscribers certificate. Typically from a directory or database. The entity providing certificate management services and facilities for an Issuing Authority. Trustis -FPS-Glossary of Terms-v1.5.doc Page 1

Certificate Policy (CP) A named set of rules that indicate the applicability of a certificate to a particular community and/or class of application with common security requirements. A Certificate Policy may be employed by a Certificate user to help in deciding whether a Certificate (and the binding therein), is sufficiently trustworthy for a particular purpose. Certificate Profile Certificate Revocation List (CRL) Certificate Status Discovery Certificate Status Information Certificate Service Provider (CSP) Certificate User Certification Authority Certification Path Certification Practice Statement (CPS) Confirm Content Commitment A CP may be supported by one or more CPSs. Defines the usage of the Certificate and is formally approved by the Policy Authority and the Issuing Authority. A list maintained by, or on behalf of, an Issuing Authority of the Certificates that it has issued, that have been Revoked or Suspended before the expiry stated in the Certificate. The process of ascertaining the Operational Status of a Certificate. Typically via a controlled mechanism from a Repository. Also known as Certificate Status Checking Information that indicates whether Certificates have been Revoked or Suspended; commonly provided via Certificate Revocation Lists, or individually through specific online enquiries (e.g. OCSP). See also Participant. The term CSP is used in connection with the EU Electronic Signatures Directive and Supporting ETSI Standards. See Relying Party See Issuing Authority A logical and ordered sequence of Certificates which, together with the Public Key of the initial object in the Certification Path, can be processed to obtain that of the final object in the Certification Path. A statement of the procedures and practices employed in the issuing, managing, revoking, and renewing of certificates. A CPS may support of one or more Certificate Policies. Ascertain through appropriate inquiry and investigation. An action whereby a signer of a message commits to the content being signed by them. This term is sometimes used synonymously with Non- Repudiation, however, in any specific context the detailed definition may result in its legal standing differing from that of Non-Repudiation. See also Non-Repudiation Corresponding Private Key Given a public key taken from a key pair, the Trustis -FPS-Glossary of Terms-v1.5.doc Page 2

corresponding private key is the private key from that same key pair, (and vice-versa for corresponding public key). Cross-certificate Digital Certificate Digital Signature End-Entity Hash Function Hash High Security Zone Hold a Private Key Incorporate by Reference A Certificate used to establish a trust relationship between two Issuing Authorities. See Certificate The result of a transformation of a message by means of a cryptographic system and a Hash Function, using keys such that a person who has the initial Message can determine: 1. Whether the transformation was created using the Private Key that corresponds to the signer's Public Key, and 2. Whether the initial Message has been altered since the transformation was made. Those using Digital Certificates. See Subscriber and Relying Party An algorithm mapping or translating one sequence of bits into another, generally smaller, set (the Hash or Message Digest) such that: 1. A Message yields the same Hash result every time the algorithm is executed using the same Message as input; 2. It is computationally infeasible that a Message can be derived or reconstituted from the Hash result provided by the algorithm; and 3. It is computationally infeasible that two Messages can be found that produce the same hash result using the algorithm The output produced by a Hash Function upon processing a Message (see also Message Digest). An area to which access is controlled through an entry point and is limited to authorised, appropriately screened personnel and properly escorted visitors. High-Security Zones should be accessible only from Security Zones, and are separated from Security Zones and Operations Zones by a perimeter built to the specifications recommended in a threat risk assessment. High- Security Zones are monitored 24 hours a day and 7 days a week by security staff, other personnel or electronic means. To use or to be able to use a Private Key. Make one Message a part of another Message by:- 1. Identifying the Message to be incorporated; 2. Providing information which enables the Receiving Party to access and obtain the incorporated Message in its entirety; and 3. Expressing the intention that it be part of the Trustis -FPS-Glossary of Terms-v1.5.doc Page 3

Issuance (Issue a Certificate) Issuing Authority Issuing Authority Certificate Key Pair Local Registration Authority (LRA) Message Message Digest Message Integrity Non-repudiation Notify Online Certificate Status Protocol (OCSP) Operational Period of Certificate Operations Zone incorporating Message. The incorporated Message shall have the same effect as if it had been fully stated in the incorporating Message to the extent permitted by law. The acts of an Issuing Authority in creating a Certificate which is bound to a Subscriber. The process requires Authentication of the Subscriber and/or Subject. By definition, an Issuing Authority is the entity listed in the issuer field of a Digital Certificate. The Issuing Authority may obtain benefit in return for taking on the risks associated with transactions secured by Digital Certificates, for example, risk of fraud. The Issuing Authority has the responsibility for deciding who may be issued with a Certificate carrying its name. A Certificate for an Issuing Authority s Public Key, and for use in signing Certificates created by certificate authority software under its control. In an Asymmetric Cryptosystem - a Private Key and its mathematically related Public Key having the property that the Public Key can verify a Digital Signature that the Private Key creates. See Registration Authority A digital representation of information. The output produced by a Hash Function upon processing a Message. The assurance of the unaltered status of a Message. Strong and substantial evidence of the identity of the Signer of a Message and of Message Integrity, sufficient to prevent a party from successfully denying the original submission or delivery of the Message and the integrity of its contents. See also Content Commitment Communicate or make available information to another person as required under the circumstances A network protocol used to ascertain the current validity status of a Certificate. The Operational Period of a Certificate begins on the date and time it is issued by an Issuing Authority (or on a later date and time certain if stated in the Certificate), and ends at the completion of its Validity Period unless it is earlier Revoked or Suspended. An area where access is limited to personnel who work there and to properly escorted visitors. Operations Zones should be monitored at least periodically, based on a threat risk assessment, and should preferably be accessible from a Reception Zone. Trustis -FPS-Glossary of Terms-v1.5.doc Page 4

Participant Public Key Infrastructure (PKI) PKI Disclosure Statement (PDS) An individual or organisation that plays a role within a given a PKI, typically as a Subscriber, Relying Party, CA, RA or Certificate Manufacturer. Entities other than Subscribers, Subjects and Relying Parties (i.e. not End Entities) may also be known as a Trust Service Provider (TSP) or a Certificate Service Provider (CSP). A system of Digital Certificates, Certificate Authorities, and other components that verify and authenticate the validity of parties involved in electronic transactions. An instrument that supplements a CP or CPS by disclosing critical information about the policies and practices of a CA/PKI. A PDS is a vehicle for disclosing, summarising and emphasizing information normally covered in detail by associated CP and/or CPS documents. A PDS is not intended to replace a CP or CPS. Policy Authority Policy Qualifier Post-Authorisation Pre-Authorisation Private Key Public Key Public Key Cryptography Public-access Zone The entity that has ultimate responsibility for governance and control over the issuance, management and usage of a specified set of Digital Certificates. It uses a Certificate Policy as the mechanism to exercise control over all Participants in a PKI. Also known as Policy Management Authority (PMA). Policy dependent information that may accompany a CP identifier in an X.509 certificate. A Registration Authority process whereby Certificate Applicants have their identity authenticated during the Certificate application process. Also know as Post-Authentication A Registration Authority process whereby Certificate Applicants have their identity authenticated prior to submitting a Certificate application. Also know as Pre-Authentication The private part of an asymmetric key pair used for public key encryption techniques. The Private Key is typically used for signing Digital Signatures or for decrypting Messages. The public part of an asymmetric key pair used for public key encryption techniques. The public key is typically used for verifying digital signatures or to encrypt messages to the owner of the private key. See Asymmetric Cryptosystem An area in which there is no personnel access control. Generally surrounds or forms part of a security facility. Examples include the grounds surrounding a building, and public corridors and elevator lobbies in multipleoccupancy buildings. Boundary designators such as signs and direct or remote surveillance may be used to Trustis -FPS-Glossary of Terms-v1.5.doc Page 5

discourage unauthorised activity. Reception Zone Registration Authority (RA) Registration Authority Operator (RAO) Relying Party Relying Party Agreement (RPA) Repository Re-Key a Certificate The entry to a facility where the initial contact between the public and the facility occurs, where services are provided, information is exchanged and access to restricted (Operations, Security and High-security) zones is controlled. To varying degrees, activity in a Reception Zone is monitored by the personnel who work there, by other personnel or by security staff. Access by the public may be limited to specific times of the day or for specific reasons. Entry beyond the Reception Zone is indicated by a recognisable perimeter such as a doorway or an arrangement of furniture and dividers in an open office environment. An entity that is authorised or licensed by an Issuing Authority to carry out the practices and procedures for one or more of the following functions: 1. the identification and authentication of certificate applicants; 2. the approval or rejection of Certificate applications; 3. initiating Certificate Revocations or Suspensions under certain circumstances; 4. processing requests to revoke or suspend Certificates; 5. approving or rejecting requests by for the Renewal or Re-Key of certificates. An RA does not have responsibility for signing or issuing Certificates or Certificate Status Information. Registration Authority staff member with approvals to conduct a full set of Certificate management functions A recipient of a Certificate who acts in reliance on that certificate and/or any Digital Signatures verified using that Certificate. Also known as Certificate User. An agreement between an Issuing Authority and a Relying Party that typically establishes the rights and obligations between those parties regarding the verification of Digital Signatures or other uses of Certificates. Also known as Relying Party Charter. The entity providing community-wide accessible mechanisms by which Participants can obtain Certificate or Certificate Status information to validate Certificates, and obtain Policy and other controlling information for the PKI. The process by which an existing Certificate has its Public Key value changed by issuing a new certificate with a different (usually new) Public Key. Notably all characteristics relating to the Subject of the Certificate remain unchanged unless Re-Key is combined with a Renewal or Issuance of a new Trustis -FPS-Glossary of Terms-v1.5.doc Page 6

Renewal (Renew a Certificate) Revocation (Revoke a Certificate) Revocation Information Security Zone Signer Subject Subscriber Subscriber Agreement Suspension (Suspend a Certificate) Time-stamp Time-stamping Authority Certificate. The process by which an existing Certificate that is bound to a Subscriber is replaced by issuing a new Certificate to that Subscriber. Typically this is based upon the validity of the existing Certificate. This process normally involves a Re-Key. Permanently end the Operational Period of a Certificate from a specified time. Information required before enacting a Certificate Revocation (or Suspension). It must include evidence of the authenticity of the requestor. An area to which access is limited to authorised personnel and to authorised and properly escorted visitors. Security Zones should preferably be accessible from an Operations Zone, and through a specific entry point. A Security Zone need not be separated from an Operations Zone by a secure perimeter. A Security Zone should be monitored 24 hours a day and 7 days a week by security staff, other personnel or electronic means. A person who creates a Digital Signature for a Message. The entity named or identified in a certificate issued to a person, organisation or device, and who holds a Private Key corresponding to the Public Key listed in the Certificate. A Subject may also be a Subscriber. A Subject must always be either: 1. a Subscriber or 2. formally bound under the jurisdiction of a Subscriber An entity that contracts with an Issuing Authority for the issuance of Certificates. The Subscriber bears ultimate responsibility for the use of the Private Key associated with the Certificate. The Subscriber may be a Subject acting on its own behalf. An agreement between an Issuing Authority and a Subscriber that establishes the rights and responsibilities of the parties regarding the issuance and management of Certificates and Associated Private Keys. Temporarily make a Certificate non-operational from a specified time for a period up to the end of its Validity Period To create a notation that indicates, at a minimum, the correct date and time of an action or activity and the identity of the entity that created the notation; or such a notation is appended, attached or referenced as apart of a data structure. Time-stamps may, but do not require derivation of chronological data from a secure time source and/or use cryptographic techniques to persevere the integrity of the Time-stamp. The Trust Service Provider operating, controlling and Trustis -FPS-Glossary of Terms-v1.5.doc Page 7

issuing time-stamps for use by other entities. Trust Infrastructure Trust Service Trust Service Provider (TSP) Trustworthy System Validation Validity Period Verify (a Digital Signature and/or Message Integrity) Vettor See Public Key Infrastructure 1. A trust-enhancing service offered or performed by a Trust Service Provider that supports the assurance, integrity or security of electronically executed activities, (e.g. Time-stamping, notarisation, watermarking etc.) 2. The service offered or performed by an Issuing Authority, Registration Authority, Certificate Manufacturer or other trusted intermediary relating to the issuance and control of Digital Certificates, (e.g. manufacture, Issuance, Revocation, publication, registration, validity-checking or defining policy). An entity that acts as a supplier of Trust Services. See also Participant. Also known as Certificate Service Provider (CSP) Computer hardware, software and procedures that: 1. Are adequately secure from intrusion and misuse; 2. Provide an adequate level of availability, reliability and correctness of operation; 3. Are adequately suited to performing their intended functions; and 4. Adhere to generally accepted security principles. See Authentication The period that is defined within a Certificate, during which that Certificate is intended to be valid. See also Operational Period In relation to a given Digital Signature, Message and Public Key, to determine accurately: 1. That the Digital Signature was created during the Operational Period of a Valid Certificate by the Private Key corresponding to the Public Key listed in the Certificate; and 2. That the Message has not been altered since its Digital Signature was created. Registration Authority staff member with approvals to conduct a limited set of Certificate management functions Copyright Trustis Limited 2000-2014. All Rights Reserved Trustis -FPS-Glossary of Terms-v1.5.doc Page 8