31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

March, 2007<br />

the owner by the CA that is encrypted using the owner's public key. If the<br />

owner can correctly decrypt the ciphertext key using the associated private<br />

key and then provide evidence that the key was correctly decrypted (e.g., by<br />

encrypting a random challenge from the CA, then the owner has established<br />

POP. However, when a key pair is intended to support key establishment,<br />

POP may also be afforded by using the private key to digitally sign the<br />

certificate request (although this is not the preferred method). The key<br />

establishment private key shall not be used to perform signature operations<br />

after certificate issuance.”<br />

142

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!