Question: I need help in doing this work. The CA will sign the intermediate CA s public key and allow it to sign client certificates. The
I need help in doing this work.
The CA will sign the intermediate CAs public key and allow it to sign client certificates. The intermediate CA will then sign a certificate of a client. You will also have to create modified versions of the openssl.cnf file for each of them. The following are details of the CA intermediate CA and client.
CA: CARoot, Inc. wwwcaroot.com US
Intermediate CA: Trust Services, Inc. wwwtrustservices.com US
Client: University of Denver universityofdenveredu US
Perform the following actions using the OpenSSL command line. Note that you must use the configuration files in your commands; do not put every applicable parameter in the command line.
As is done here, create a CA and a client CSR Do not sign the CSR using the CA yet.
Create a folder for an intermediate CA Repeat the same steps as for a CA but add the following new section to its OpenSSL configuration file.
intcareq This section should include extensions that the intermediate CA would like to include in its CSR file while requesting a signature from the CA Ask for extensions that would allow the intermediate CA to sign other certificates, sign its CRL or generate digital signatures. All extension fields should be critical.
Create a new section in the CAs OpenSSL configuration file.
intca This section should include default extensions that the CA will add when signing a certificate for an intermediate CA It should allow the intermediate CA to sign other user certificates but not sign certificates for other intermediate CAs hint: pathlen The extensions should also have the subject and authority key identifier.
Generate a CSR for the intermediate CAs certificate. Then get it signed by the CA to generate the intermediate CAs certificate name it interimca.crt The intermediate CA certificate should have a validity of years. Verify the certificate and ensure that the correct extensions are present in it
Next get the clients certificate signed by the intermediate CA Name the certificate universityofdenver.crt Client certificates should be given a validity of months.
Verify the entire certificate chain, ie verify universityofdenver.crt using the CA and intermediate CAs certificates.
Submit a text file with the list of commands used by you in the exercise along with the three certificates created CA intermediate CA and client and the OpenSSL configuration files for the CA and the intermediate CA
Here is a command sequence: ################################################
# Generic Cryptographic Operations
################################################
# Create working directory
mkdir keying
cd keying
#####
# Create test file with some text
nano file.txt
# See file
cat file.txt
#####
# Hash function
openssl dgst help
openssl dgst sha file.txt
openssl dgst sha file.txt
openssl dgst sha file.txt
#####
# HMAC
openssl dgst shahmac file.txt
openssl dgst shahmac file.txt
openssl dgst shahmac out fileshaout binary file.txt
cat fileshaout
xxd fileshaout
#####
# AESCBC Encrypt
openssl enc aesK abcdefabcdefin file.txt iv abcdefabcdab out fileaescbcout
cat fileaescbcout
xxd fileaescbcout
# Different iv different encryption
openssl enc aesK abcdefabcdefin file.txt iv abcdefabcdac out fileaescbcout
xxd fileaescbcout
# Base encoded output
openssl enc baseaesK abcdefabcdefin file.txt iv abcdefabcdac out fileaescbcb
cat fileaescbcb
#####
# AESCBC Decrypt just use d
openssl enc d baseaesK abcdefabcdefin fileaescbcbiv abcdefabcdab out filedecrypted.txt
#####
# List of ciphers
openssl list cipheralgorithms
#####
# RSA key generation
openssl genrsa out keypair.pem
# See keys modulus and priv.exp is private key, modulus and pub.exp is public key
openssl rsa in keypair.pem text noout
# Extract public key into a separate file
openssl rsa in keypair.pem pubout out pubkeypair.pem
openssl rsa in pubkeypair.pem pubin text noout
#####
# RSA encryption
openssl rsautl encrypt pubin inkey pubkeypair.pem in file.txt
openssl rsautl encrypt pubin inkey pubkeypair.pem in file.txt out filersa.out
#####
# RSA decryption
openssl rsautl encrypt pubin inkey pubkeypair.pem in file.txt out filersa.out
openssl rsautl decrypt inkey keypair.pem in filersa.out
#####
# Digital signature
openssl dgst shasign keypair.pem out filesignature file.txt
xxd filesignature
openssl dgst shaverify pubkeypair.pem signature filesignature file.txt
############ a detailed explanation with the steps performed willl be helpful.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
