diff -r d07aa956024a -r 030c4fbc13d7 cryptomgmtlibs/securitydocs/doxygen_docs/Security_glossary.dox --- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_glossary.dox Thu Apr 01 00:24:41 2010 +0300 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,615 +0,0 @@ -/** -@page security_glossary Security glossary -\n -A glossary of security terms (mostly non-Symbian specific). -\n\n -@ref A, @ref B, @ref C, @ref D, @ref E, @ref F, @ref G, @ref H, @ref I, @ref J, @ref K, @ref L, @ref M, @ref N, @ref O, -@ref P, @ref Q, @ref R, @ref S, @ref T, @ref U, @ref V, @ref W, @ref X, @ref Y, @ref Z -\n @anchor A \n - - - - - - - - - - - - - - - - - - - - - - -
A
@anchor AES AESAdvanced Encryption Standard -- The new conventional symmetric @ref block_cipher "block cipher" chosen by NIST as a - replacement for @ref DES. It can process 128-bit data blocks using - cipher keys with lengths of 128, 192, or 256 bits.
@anchor ASN ASN.1Abstract Syntax Notation 1 (See: ASN.1, - ISO/IEC 8824, and ISO/IEC 8825.) -- A data specification meta-language widely used in @ref public_key_cryptography "public key cryptography" - standards. (Also of interest: A Layman's Guide to - a Subset of ASN.1, BER, and DER.)
@anchor asymmetric @anchor Asymmetric Asymmetric CryptographyA form of cryptography in which the 'key' is generated as a key pair: if one key is used for @ref encryption only the - other can be used to decrypt, and vice versa. \n\n - Using asymmetric cryptography, the problem of key distribution becomes one of @ref authentication; i.e. how to make sure - that a given key really does belong to the entity that claims to own it. See: - @li @ref asymmetric_cryptography - @li @ref SS_Cryptalg_asymmetric_ciphers.
@anchor attribute_cert Attribute CertificateA digitally signed data structure including at least an identifier for an individual entity and a set of - attributes, whose function is to bind the entity with the attributes, usually for the purpose of authorisation. -
@anchor authentication @anchor Authentication AuthenticationUsually used to refer to a property of a communication; that the receiver of a message is able to ascertain its - origin, so an attacker cannot successfully impersonate the sender.
\n @anchor B \n - - - - - - - - - - - -
B
@anchor BER BERBasic Encoding Rules for @ref ASN "ASN.1", as defined in X.690. (Also of interest: - A Layman's Guide to a Subset of ASN.1, BER, and DER.) -
@anchor block_cipher Block CipherA class of symmetric algorithm in which several bits of the input data are encrypted at once in a fixed-size - block. The cipher and its mode of operation define the block size: the @ref plaintext is split up into appropriately-sized - blocks and each block is fed into the cipher.
\n @anchor C \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
C
@anchor CA CACertification Authority -- An organisation that performs the following functions in a hierachical @ref PKI: - @li providing trusted @ref root_certificate "'root' certificates" to users (@ref EE "End Entities"), by supplying them with the CA's @ref public_key "public key" via - out-of-band means. - @li certifying End Entities (@ref EE "EE"s) by generating and distributing certificates for them. The certified @ref EE is the - subject of the @ref certificate; the CA is the issuer. The CA validates the certificate holder's identity and 'signs' - the @ref certificate so that it cannot be tampered with or forged. The @ref certificate issued by the CA binds a particular - @ref public_key "public key" to the name of the @ref EE the @ref certificate identifies. - @li supporting certificate revocation and revocation checking: if an @ref EE suspects that their key has been compromised, - they can contact the CA that issued it, who will then revoke their @ref certificate. - - A CA will always have a root certificate-signing key pair that must be authenticated to End Entities via @ref out_of_band "out of band" - channels. This key pair is not logically certified by anything, but it is usually distributed inside a self-signed - @ref certificate to afford some degree of tamper evidency. \n\n - However, CAs do not have to use their root key pair to issue certificates directly to End Entities. For organizational - reasons and to reduce the exposure of keys, a CA may have a single root signing key pair, which it uses to certify a - set of subordinate key pairs that in turn are used to certify End Entities. Also, CAs may certify the signing keys - of other CAs by issuing cross certificates, which enable interoperation between two distinct @ref PKI "PKI"s.
@anchor CA_certificate CA Certificate - A @ref certificate held by a @ref CA: the key pair associated with it is used for signing certificates issued by that - @ref CA. May or may not be self-signed.
@anchor CBC CBCCipher Block Chaining -- A cryptographic mode for @ref block_cipher "block ciphers". It is an @ref encryption method that protects - against block replay attacks by making the encryption of a cipher block dependent on all blocks that precede it. - Before it is encrypted, the @ref plaintext is XORed with the previous @ref ciphertext block (which has been stored in a - feedback register). After the encryption, the resulting ciphertext is again stored in the feedback register, to - be XORed with the next plaintext block, and so on until the end of the message.
@anchor certificate @anchor certificates CertificateFor our purposes, this is the same thing as a @ref public_key_certificate "public key certificate".
@anchor ciphermode Ciphermode description
@anchor ciphertext CiphertextThe output of an @ref encryption operation, or the input to a @ref decryption operation.
@anchor CLDC CLDCJ2ME Connected Limited Device Configuration -- Serves the market consisting of personal, mobile, and - connected information devices. This configuration includes some new classes designed specifically to fit the - needs of small-footprint devices.
@anchor client_authentication Client AuthenticationIn a secure client-server protocol such as @ref TLS, the process in which the client authenticates itself to - the server, so the server knows who it's talking to. \n See @ref WTLS_client_authentication "client authentication in WTLS".
Client/User/End Entity CertificateA @ref certificate issued by a @ref CA to an end entity, @ref EE, who may use it to demonstrate their - ownership of the key pair associated with it.
@anchor CRL CRLCertificate Revocation List -- A list of (identifiers for) @ref certificates that have been revoked by a - particular @ref CA. The use of CRLs is for maintaining access to servers in a network, in a @ref PKI; in some cases, - @ref OCSP has superseded CRL. See: - @li RFC2459 - -- Internet @ref X509 "X.509" @ref PKI Certificate and CRL Profile - @li RFC3279 - -- Algorithms and Identifiers for the Internet @ref X509 "X.509" @ref PKI Certificate and Certificate Revocation List - (@ref CRL) Profile - @li RFC3280 - -- Internet @ref X509 "X.509" @ref PKI Certificate and Certificate Revocation List (@ref CRL) Profile. -
@anchor cross_certificate Cross CertificateA @ref certificate issued by a @ref CA which certificates another @ref CA's @ref root_certificate "root certificate". This is way of uniting two distinct - certification hierarchies.
\n @anchor D \n - - - - - - - - - - - - - - - - - - - - - - - -
D
@anchor decryption DecryptionThe process of turning encrypted data (called @ref ciphertext) into the original information (called - @ref plaintext) using a cryptographic algorithm parameterised with a key.
@anchor DER DERDistinguished Encoding Rules -- A set of rules for encoding @ref ASN "ASN.1" data structures as a byte stream, which - has the property that any given @ref ASN "ASN.1" data structure will always encode to the same byte stream. DER is a - subset of @ref BER. (Also of interest: - A Layman's Guide to a Subset of ASN.1, BER, and DER.) -
@anchor DES DESData Encryption Standard -- A symmetric @ref block_cipher "block cipher" (that is the U.S. and international standard) used for - @ref encryption and @ref decryption. A 64-bit block cipher with a 56-bit key organized as 16 rounds of operations.
@anchor digital_signature Digital SignatureA structure linking some data and a @ref private_key "private key". A digital signature may be generated by the application of a - private key to some piece of data. The original data may be reconstructed by applying the corresponding @ref public_key "public key", - demonstrating that the signature could only have been generated by someone with access to the private key.\n\n - Digital signatures have two primary uses: to demonstrate someone's identity by signing some challenge, as in - @ref client_authentication "client authentication" in @ref TLS, in which the client signs a @ref hash of the messages that have been exchanged; - and more strongly, for someone to demonstrate their acceptance of some human-processable information (e.g. - 'Please withdraw £10,000 from my bank account') as in the @ref WMLScript Crypto API SignText function.\n\n - See: an introduction to @ref Security_signatures.
@anchor DN DNDistinguished Name -- An @ref ASN "ASN.1" structure containing various attributes (name-value pairs) that together - uniquely identify the entity for certification purposes. \n\n - The name used in @ref X509_certificate "X.509 certificates" is the X.500 Distinguished Name, which describes a path - through an X.500 Directory Information Tree. Conventionally, a DN comprises at least three attributes: a user's - name/ID (e.g., \c cn=Fred \c Bloggs), an organization name (e.g., \c o=Symbian \c UK \c Ltd), and a country designation - (e.g., \c c=GB ). -
@anchor DSA DSADigital Signature Algorithm -- A NIST-approved @ref asymmetric algorithm. It can only be used for generating - and verifying @ref digital_signature "digital signatures", not for @ref encryption. - See: The Digital Signature Standard. -
\n @anchor E \n - - - - - - - - - - - - - - - - - -
E
@anchor ECB ECBElectronic Codebook -- A cryptographic mode for @ref block_cipher "block ciphers". It is a mode that encrypts - blocks of @ref plaintext to corresponding blocks of @ref ciphertext. Given use of the same key, a block of plaintext - will always encrypt to the same block of ciphertext.
@anchor ECC ECCElliptical Curve Cryptography -- An @ref asymmetric @ref encryption technique based on elliptic curve theory that - can be used to create faster, smaller, and more efficient cryptographic keys.
@anchor encryption EncryptionThe process of turning meaningful data (called @ref plaintext) into meaningless gibberish (called @ref ciphertext) - using a cryptographic algorithm parameterised with a key.
@anchor EE EEEnd Entity -- A leaf node in a certification hierarchy: any entity in a @ref PKI which has a @ref certificate, but is - not allowed to issue its own certificates.
\n @anchor F \n - - - - - -
F
\n @anchor G \n - - - - - -
G
\n @anchor H \n - - - - - - - - - - - -
H
@anchor hash HashHash algorithms take a variable-length input and produce a fixed length output known as a digest, or hash, of the - input. For cryptographic purposes they need to be one-way functions: it should not be possible to deduce the input - from the digest, or even any part of the input. Also, it should be hard to find collisions: that is, two different - inputs that produce the same output. See: - @li @ref cryptographic_hash - @li @ref SS_Cryptalg_hash_algorithms.
@anchor HMAC HMACKeyed-Hashing for Message Authentication -- A mechanism for message @ref authentication using cryptographic hashes. It - can be used with any iterative cryptographic @ref hash function, e.g., @ref MD5, @ref SHA "SHA-1", in combination with a secret - shared key. The cryptographic strength of HMAC depends on the properties of the underlying @ref hash function.
\n @anchor I \n - - - - - - - - - - - -
I
@anchor ICC ICCIntegrated Circuit Card -- A removable card with at least data storage and sometimes processing.
@anchor IPSec IPSecIP Security Protocol -- A standard providing @ref secrecy and @ref authentication at the network or - datagram layer of network communication. IPSec is mandatory in IPv6. \n - See: IPSec Working Group.
\n @anchor J \n - - - - - -
J
\n @anchor K \n - - - - - -
K
\n @anchor L \n - - - - - -
L
\n @anchor M \n - - - - - - - - - - - - - - - - - -
M
@anchor MD2 MD2Legacy @ref hash algorithm. Considered insecure.
@anchor MD5 MD5Legacy @ref hash algorithm. Considered vulnerable.
@anchor message_digest_algorithm Message Digest AlgorithmSame as a @ref hash algorithm.
@anchor MIDP MIDPMobile Information Device Profile (JSP-118). - -- A set of Java APIs that is generally implemented on the @ref CLDC "Connected Limited Device Configuration" (CLDC). - It provides a basic J2ME application runtime environment targeted at mobile information devices, such as - mobile phones and two-way pagers. The MIDP specification addresses issues such as user interface, persistent storage, - networking, and application model.
\n @anchor N \n - - - - - - - - -
N
@anchor nonrepudiation Non-repudiationThe process by which it is assured that an entity making a declaration cannot subsequently deny having made it: - so I can't claim that I never wrote that cheque.
\n @anchor O \n - - - - - - - - - - - - - - - - - - - -
O
@anchor OAEP OAEPOptimal Asymmetric Encryption Padding -- OAEP is a method for encoding messages, and addresses a potential - vulnerability in PKCS#1. Padding means extra - bits concatenated with a key, password, or @ref plaintext. @ref Padding helps against dictionary attacks.
@anchor OCSP OCSP@ref X509 "X.509" Internet Public Key Infrastructure Online Certificate Status Protocol -- A simple request/response - protocol. To establish whether a given @ref certificate or list of certificates has/have been revoked, a client forms an - OCSP request and sends this to an OCSP server. The server maintains revocation information in the form of, say, - Certificate Revocation Lists (@ref CRL "CRL"s). The server replies to the client with a signed OCSP response, stating for - each certificate whether the status is Good, Revoked, or Unknown. This response in turn is checked to ensure that it - is valid, and that it is from an entity trusted for performing revocation checking. - See: - @li RFC2560 - -- @ref X509 "X.509" Internet @ref PKI Online Certificate Status Protocol - OCSP - @li @ref overview_OCSP overview.
@anchor OID OIDObject Identifier -- A universal constant uniquely associated with an object type used in @ref ASN "ASN.1".
@anchor OS OS ElementA discrete, identifiable entity within a ROM file that implements a set of interfaces. Examples of - OS Elements include independently instantiable classes within DLLs, bitmaps within an MBM file, resource - entries within a resource file. An OS Element identifies a part of a ROM file that could in principle be - factored out or removed if it becomes architecturally advisable.
@anchor out_of_band Out Of BandA channel of communication that is distinct from the channel which we are using cryptography to try to secure, - and which is secure on its own terms; that is, its security is not dependent on the cryptography we are using. - A common example of an out of band channel is a motorcycle courier. -
\n @anchor P \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
P
@anchor Padding @anchor padding PaddingExtending the size of a block of @ref plaintext to, say, a 64-bit block by addition of a regular or random pattern. - For example, for use with @ref ECB. See: - @li @ref rsa_padding - @li @ref symmetric_ciphers.
@anchor PKCS PKCSPublic-Key Cryptography Standards.
PKCS#10@ref PKI standard that describes how to construct @ref certificate requests.
@anchor PKG PKG fileA text file that defines a @ref SIS file. The PKG file is passed to the MAKESIS tool to produce the - @ref SIS file.
@anchor PKI PKIPublic Key Infrastructure -- A way of modelling real-world trust relationships that enables users of - @ref public_key_cryptography "public key cryptography" to have confidence in the ownership of the @ref public_key "public keys" they are using. A PKI consists of: - @li a trusted third party (@ref TTP) - @li an @ref out_of_band "out of band" means of distributing the @ref TTP's @ref public_key_certificate "public key certificate" to @ref relying_party "relying parties" - @li a means of distributing other certificates to @ref relying_party "relying parties" - @li arrangements for the @ref revocation and renewal of these certificates - @li certificate management and validation software on the @ref relying_party "relying party's" computer - - The TTP uses its signing key pair to create certificates for other entities, which relying parties can use to - authenticate these other entities. - - We can classify PKIs according to whether they are hierachical or flat. In hierachical PKIs, such as the one defined - in the PKIX set of standards, there is a distinction between users of the PKI such as End Entities (@ref EE "EE"s) and - @ref relying_party "relying parties", and entities responsible for issuing and distributing certificates such as @ref CA "CA"s and - @ref RA "RA"s. In a flat PKI such as the @ref web_of_trust "web of trust" underpinning @ref PGP, there are no entities whose sole role is - to issue certificates; instead users of the PKI certify each other.
@anchor PKIX PKIXPublic-Key Infrastructure (X.509) -- A profile of @ref X509 "X.509" for the internet. See: - @li @ref Certman_X509_Certificate_Validation - @li RFC2459 - -- Internet X.509 Public Key Infrastructure Certificate and CRL Profile.)
@anchor plaintext PlaintextThe output of an @ref decryption operation, or the input to a @ref encryption operation.
@anchor PGP PGPPretty Good Privacy -- A very widely-used @ref encryption and digital signing program.
@anchor private_key Private KeyIn the context of @ref public_key_cryptography "public key cryptography", the private half of the key pair.
@anchor public_key Public KeyIn the context of @ref public_key_cryptography "public key cryptography", the public half of the key pair.
@anchor public_key_certificate Public Key CertificateA digitally signed structure including at least an identifier for an individual entity and a @ref public_key "public key", whose - function is to bind the entity with the key.
@anchor public_key_cryptography Public Key CryptographyA common application of @ref asymmetric cryptography in which one half of the key pair is kept secrect - (the @ref private_key "private key") and the other half is published (the @ref public_key "public key"). See: - @li @ref asymmetric_cryptography - @li @ref Security_intro_PKC.
\n @anchor Q \n - - - - - -
Q
\n @anchor R \n - - - - - - - - - - - - - - - - - - - -
R
@anchor RA Registration AuthorityAn organization responsible for registering new @ref certificate users in a @ref PKI, e.g. by gathering and verifying - information which identifies the @ref certificate applicant.
@anchor revocation RevocationThe term used for asserting that a @ref certificate is no longer valid: for example, because the @ref private_key "private key" - associated with it has been compromised.
@anchor relying_party Relying PartyAn entity who relies on the authenticity of a @ref public_key "public key".
@anchor root_certificate Root CertificateThe @ref certificate of a @ref TTP "trusted third party". A certificate directly trusted by a @ref relying_party "relying party" - that is, trust in it is not established by cryptographic means, but trust in it is the prerequisite for establishing - trust in the entity which the relying party is trying to authenticate. Trust in a root certificate must be established - through @ref out_of_band "out of band" means. A root certificate may or may not be self signed.\n\n - See: @ref certman_certstore_root_cert_management.
@anchor RSA RSAA @ref public_key "public key" algorithm used for both @ref encryption and @ref digital_signature "digital signatures", named after its creators: - Rivest, Shamir, and Adleman.
\n @anchor S \n - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
S
@anchor secrecy SecrecyThis means that access to information is controlled: for example, it means that two entities (e.g. people, - machines, processes) are able to communicate with one another without any other entities being able to access the - information communicated, or that an entity may store some information and be assured that only this entity will be - able to access it.
@anchor SHA SHA-1Secure Hash Algorithm 1 -- A widely used @ref hash algorithm, producing a 160-bit digest.
@anchor server_authentication Server AuthenticationIn a secure client-server protocol such as @ref TLS, the process in which the server authenticates itself to the - client, so the client knows to whom it's talking. \n See: @ref WTLS_server_authentication "Server authentication in WTLS".
@anchor SignText SignTextA function defined in the @ref WMLScript Crypto API that provides application-level @ref authentication and - @ref nonrepudiation "non-repudiation" for transactions.
@anchor SIS SIS fileA binary package file containing all the files for an installation, as well as metadata describing which - directory to install them into, dependencies, etc..\n - See: @ref overview_SWI overview.
@anchor Stub SIS Stub fileA @ref SIS file containing only the metadata, and not the files. After the installation, this file is archived - on the device for uninstallation purposes, etc..
@anchor SMIME S/MIMESecure/Multipurpose Internet Mail Extensions - -- Provides a consistent way to send and receive secure MIME data. S/MIME provides the following cryptographic - security services for electronic messaging applications: @ref authentication, message integrity and @ref nonrepudiation "non-repudiation" of - origin (using @ref digital_signature "digital signatures") and privacy and data security (using @ref encryption); see - RFC2633 -- S/MIME Version 3 Message Specification. -
@anchor SSL SSLSecure Sockets Layer -- A protocol for securing network connections that provides @ref authentication, @ref encryption, and - data integrity using @ref PKI "Public Key Infrastructure" (PKI). Precursor to @ref TLS. SSL has been through three versions: - the first two are considered insecure, and the third is almost identical to @ref TLS.
@anchor stream_cipher Stream CipherA class of symmetric algorithm that is initialised with a key, then outputs a stream of pseudorandom bits. - This 'keystream' is typically XOR-ed with the @ref plaintext to generate the @ref ciphertext. So they encrypt a bit of - plaintext at a time.
@anchor symmetric_cryptography Symmetric CryptographyA form of cryptography in which the same key is used for @ref encryption and @ref decryption.\n\n - Symmetric cryptography is fast, but suffers from the problem of how to distribute the key privately. @ref Asymmetric - cryptography is an attempt to alleviate the key distribution problem, by reducing the requirement for the distributed - key from one of privacy to one of @ref authentication. See: - @li @ref symmetric_ciphers - @li @ref SS_Cryptalg_symmetric_ciphers.
\n @anchor T \n - - - - - - - - - - -
T
@anchor TLS TLSTransport Layer Security -- A protocol that provides communications secrecy, and optionally @ref authentication, - over the Internet TCP/IP. The protocol allows client/server applications to communicate in a way that is designed to - prevent eavesdropping, tampering, or message forgery. - - In this protocol a client connects to a server; the two then perform a handshake in which they exchange a - symmetric key by using @ref asymmetric cryptography, which is then used to encrypt their communications, - providing the @ref secrecy element. Without the @ref authentication element, @ref secrecy is not very useful; although - only client and server can understand the data exchanged, the client doesn't know who the server is or vice versa. TLS - provides the capability for @ref WTLS_server_authentication "server authentication", in which the client establishes who the server is, and - @ref client_authentication "client authentication" in which the server establishes who the client is. \n\n - See: RFC2246 -- - The TLS Protocol). TLS is the successor to the @ref SSL "Secure Sockets Layer" (SSL). (Also, see: @ref WTLS.)
@anchor TTP TTPTrusted Third Party -- An entity whose @ref public_key "public key" is known to a @ref relying_party "relying party" due to its having been received - via @ref out_of_band "out of band" means, and which is trusted to issue @ref public_key_certificate "public key certificates" for other entities not directly - known to the relying party. A @ref CA is a type of TTP.
\n @anchor U \n - - - - - - - - -
U
@anchor URI URIUniform Resource Identifier -- A way to identify some content on the Internet, typically through the use of an - identifier for the scheme (e.g. HTTP) through which the content may be accessed, and an identifier for the - content that makes sense within that scheme. - The most common form of URI is a Web page address, which is a particular form or subset of URI called a Uniform - Resource Locator (URL).
\n @anchor V \n - - - - - -
V
\n @anchor W \n - - - - - Wireless Application Protocol -- A secure specification - that enables users to access information instantly using devices such as mobile phones, pagers, two-way radios, - smartphones and communicators. The WAP defines a set of protocols in transport, security, transaction, session, and - application layers to enable the creation of advanced mobile services. - - - - - - - - - - - - - - - - - -
W
@anchor WAP WAP
@anchor web_of_trust Web of TrustThe set of social relationships between users of @ref PGP that enables them to sign each others' keys, essentially - providing a @ref PKI for this technology.
@anchor WIM WIMWireless Identity Module - -- Used in performing @ref WTLS and application level security functions, and especially, to store and process - information needed for user identification and @ref authentication. Examples of WIM implementations are a Subscriber - Identity Module (SIM) card or an external smart card.
@anchor WMLScript WMLScript Crypto APIA @ref WAP Forum standard that defines cryptographic functions in WML, the scripting language used in @ref WAP. - It defines a function for creating signed objects called @ref SignText.
@anchor WTLS WTLSWireless Transport Layer Security - -- The security layer of the @ref WAP, providing privacy, data integrity and @ref authentication for WAP services. - It is a @ref WAP variant of @ref TLS and defines its own lightweight @ref certificate format. \n\n - See: @ref overview_WTLS overview.
@anchor WTLS_certificate WTLS certificate@ref WAP variant of @ref X509_certificate "X.509 certificates".\n\n - See: @ref overview_WTLS overview.
\n @anchor X \n - - - - - - - - - - - -
X
@anchor X509 X.509A widely used standard for digital certificates. See: - @li @ref Certman_X509_Certificate_Validation - @li RFC2459 - -- Internet @ref X509 "X.509" @ref PKI Certificate and @ref CRL Profile - @li RFC3280 - -- Internet @ref X509 "X.509" @ref PKI Certificate and @ref CRL "Certificate Revocation List" Profile. -
@anchor X509_certificate X.509 certificateA widely used type of @ref public_key_certificate "public key certificate", part of the now largely moribund X.500 series of standards.\n\n - An X.509 certificate is a person's/company's @ref public_key "public key" digitally signed by a trusted third party and wrapped with - attribute data such as identifying names. A hierarchy of certificates is often used tracing back to a single root - @ref CA_certificate "CA certificate". If a user trusts the @ref CA, then they can trust that the @ref certificate belongs to the - person/company given within the certificate. Using the public key within the certificate, they can then verify that - other data has originated from the certificate owner via the use of @ref digital_signature "digital signatures" created using the corresponding - @ref private_key "private key". @ref X509 "X.509" basically defines the certificate format.
\n @anchor Y \n - - - - -
Y
\n @anchor Z \n - - - - - - -
Z
@anchor zlib zlibzlib is designed to be a free, general-purpose, legally unencumbered (i.e., not covered by any patents) lossless - data-compression library for use on virtually any computer hardware and operating system. zlib was written by - Jean-loup Gailly (compression) and Mark Adler (decompression). See: - @li RFC1950, zlib format - @li RFC1951, deflate format - @li RFC1952, gzip.
-*/