Ssl

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ssl as PDF for free.

More details

  • Words: 2,720
  • Pages: 9
‫ﻣﻔﺎﻫﻴﻢ ‪ ، SSL‬ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ‬ ‫ﻭ ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ‬ ‫‪SSL (Secure Sockets Layer), Digital Signature‬‬ ‫)‪And CA (Certificate Authority‬‬ ‫‪Fundamentals‬‬ ‫ﻣﺤﻤﻮﺩ ﻣﺮﻭﺝ‬ ‫‪[email protected]‬‬ ‫ﺩﺍﻧﺸﺠﻮﯼ ﻣﻬﻨﺪﺳﯽ ﮐﺎﻣﭙﻴﻮﺗﺮ ‪ ،‬ﮔﺮﺍﻳﺶ ﻧﺮﻡ ﺍﻓﺰﺍﺭ‬

‫‪ ‐١‬ﺗﻌﺮﻳﻒ‬ ‫ﺑﺮﺍﻱ ﺷﺮﻭﻉ ‪ ،‬ﺑﺎ ﺗﻌﺮﻳﻔﻲ ﮐﻠﻲ ﺍﺯ ‪ SSL‬ﮐﻪ ﺩﺭ ﺳﺎﻳﺖ ‪ webopedia‬ﺁﻣﺪﻩ ﺍﺳﺖ ﻣﻄﻠﺐ ﺭﺍ ﺁﻏﺎﺯ ﻣﻲ ﮐﻨﻴﻢ ‪:‬‬

‫" ‪ SSL‬ﭘﺮﻭﺗﮑﻞ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺗﻮﺳﻂ ﺷﺮﮐﺖ ‪ Netscape‬ﻭ ﺑﺮﺍﻱ ﺭﺩ ﻭ ﺑﺪﻝ ﮐﺮﺩﻥ ﺳﻨﺪ ﻫﺎﻱ ﺧﺼﻮﺻﻲ ﺍﺯ ﻃﺮﻳﻖ ﺍﻳﻨﺘﺮﻧﺖ‬ ‫ﺗﻮﺳﻌﻪ ﻳﺎﻓﺘﻪ ﺍﺳﺖ‪ SSL.‬ﺍﺯ ﻳﮏ ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺑﺮﺍﻱ ﺑﻪ ﺭﻣﺰ ﺩﺭ ﺁﻭﺭﺩﻥ ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ‪ SSL‬ﻣﻨﺘﻘﻞ ﻣﻲ‬ ‫ﺷﻮﻧﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﺪ‪ .‬ﻫﺮ ﺩﻭ ﻣﺮﻭﺭﮔﺮ ‪ Internet Explorer‬ﻭ ‪] Netscape Navigator‬ﻭ ﺍﻣﺮﻭﺯﻩ ﺗﻤﺎﻡ ﻣﺮﻭﺭﮔﺮ‬ ‫ﻫﺎﻱ ﻣﺪﺭﻥ[ ﺍﺯ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﭘﺸﺘﻴﺒﺎﻧﻲ ﻣﻲ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻫﻤﭽﻨﻴﻦ ﺑﺴﻴﺎﺭﻱ ﺍﺯ ﻭﺏ ﺳﺎﻳﺖ ﻫﺎ ﺑﺮﺍﻱ ﻓﺮﺍﻫﻢ ﮐﺮﺩﻥ ﺑﺴﺘﺮﻱ ﻣﻨﺎﺳﺐ‬ ‫ﺟﻬﺖ ﺣﻔﻆ ﮐﺮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﻣﺤﺮﻣﺎﻧﻪ ﮐﺎﺭﺑﺮﺍﻥ )ﻣﺎﻧﻨﺪ ﺷﻤﺎﺭﻩ ﮐﺎﺭﺕ ﺍﻋﺘﺒﺎﺭﻱ( ﺍﺯ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﻧﻤﺎﻳﻨﺪ‪ .‬ﻃﺒﻖ ﺁﻧﭽﻪ‬ ‫ﺩﺭ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺁﻣﺪﻩ ﺍﺳﺖ ‪ URL ،‬ﻫﺎﻳﻲ ﮐﻪ ﻧﻴﺎﺯ ﺑﻪ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﺯ ﻧﻮﻉ ‪ SSL‬ﺩﺍﺭﻧﺪ ﺑﺎ ‪ https:‬ﺑﻪ ﺟﺎﻱ ‪ http:‬ﺷﺮﻭﻉ ﻣﻲ‬ ‫ﺷﻮﻧﺪ‪.‬‬ ‫ﭘﺮﻭﺗﮑﻞ ﺩﻳﮕﺮﻱ ﮐﻪ ﺑﺮﺍﻱ ﺍﻧﺘﻘﺎﻝ ﺍﻃﻼﻋﺎﺕ ﺑﻪ ﺻﻮﺭﺕ ﺍﻣﻦ ﺑﺮ ﺭﻭﻱ ﺷﺒﮑﻪ ﺟﻬﺎﻧﻲ ﻭﺏ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ‪ ،‬ﭘﺮﻭﺗﮑﻞ ﺍﻱ ﺍﺳﺖ ﺑﻪ ﻧﺎﻡ‬ ‫‪ Secure HTTP‬ﻳﺎ ‪ . S-HTTP‬ﺩﺭ ﺣﺎﻟﻴﮑﻪ ‪ SSL‬ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﻣﻦ ﻣﻴﺎﻥ ‪ Client‬ﻭ ‪ Server‬ﺍﻳﺠﺎﺩ ﻣﻲ ﮐﻨﺪ ﺗﺎ ﻫﺮ‬ ‫ﺍﻃﻼﻋﺎﺗﻲ ﮐﻪ ﺑﺮ ﺭﻭﻱ ﺁﻥ ﻣﻨﺘﻘﻞ ﻣﻲ ﺷﻮﺩ ﺍﻣﻦ ﺑﺎﺷﺪ ‪ S-HTTP ،‬ﺑﺮﺍﻱ ﺍﻳﻦ ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ ﺗﺎ ﻃﺒﻖ ﺁﻥ ﭘﻴﺎﻡ ﻫﺎﻱ‬

‫ﻣﻨﻔﺮﺩ]‪ [١‬ﺑﻪ ﻃﻮﺭ ﺍﻣﻦ ﻣﻨﺘﻘﻞ ﺷﻮﻧﺪ‪.‬ﺑﻨﺎﺑﺮﺍﻳﻦ ﺍﻳﻦ ﺩﻭ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻗﺒﻞ ﺍﺯ ﺁﻧﮑﻪ ﺩﻭ ﺗﮑﻨﻮﻟﻮﮊﻱ ﺭﻗﻴﺐ ﺑﺎﺷﻨﺪ ‪ ،‬ﺩﻭ ﺗﮑﻨﻮﻟﻮﮊﻱ ﻣﮑﻤﻞ‬ ‫ﻫﺴﺘﻨﺪ‪ .‬ﻫﺮ ﺩﻭ ﻱ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎ ﺑﻪ ﻋﻨﻮﺍﻥ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺯ ﺳﻮﻱ ‪ IETF‬ﭘﺬﻳﺮﻓﺘﻪ ﺷﺪﻩ ﺍﻧﺪ‪”.‬‬ ‫ﺗﻮﺟﻪ ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﮐﻪ ‪ SSL‬ﻳﮏ ﭘﺮﻭﺗﮑﻞ ﻣﺴﺘﻘﻞ ﺍﺯ ﻻﻳﻪ ﺑﺮﻧﺎﻣﻪ ﺍﺳﺖ )‪. (Application Independent‬‬ ‫ﺑﻨﺎﺑﺮﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻫﺎﻳﻲ ﻣﺎﻧﻨﺪ ‪ FTP ، HTTP‬ﻭ ‪ Telnet‬ﻗﺎﺑﻠﻴﺖ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺭﺍ ﺩﺍﺭﻧﺪ‪ .‬ﺑﺎ ﺍﻳﻦ ﻭﺟﻮﺩ ‪ SSL‬ﺑﺮﻭﻱ ﭘﺮﻭﺗﮑﻞ‬ ‫ﻫﺎﻱ ‪ FTP ، HTTP‬ﻭ ‪ IPSec‬ﺑﻬﻴﻨﻪ ﺷﺪﻩ ﺍﺳﺖ‪.‬‬

‫‪ –٢‬ﻣﻔﺎﻫﻴﻢ ﺭﻣﺰ ﻧﮕﺎﺭﻱ ﻣﺘﻘﺎﺭﻥ ﻭ ﻧﺎ ﻣﺘﻘﺎﺭﻥ‬ ‫ﺍﺳﺎﺱ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﻫﺎ ﻭﺟﻮﺩ ﮐﻠﻴﺪ ﻫﺎ ﻣﻲ ﺑﺎﺷﻨﺪ‪.‬ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﮐﻪ ﺷﻤﺎ ﺍﻃﻼﻋﺎﺕ ﻣﻮﺭﺩ ﻧﻈﺮ ﺧﻮﺩ ﺭﺍ ﺗﻮﺳﻂ ﮐﻠﻴﺪ ﻗﻔﻞ‬ ‫ﻣﻲ ﮐﻨﻴﺪ ﻭ ﺳﭙﺲ ﺑﺮﺍﻱ ﺭﻣﺰﮔﺸﺎﻳﻲ ﺁﻥ ﻣﺠﺪﺩﺍ ﺍﺯ ﮐﻠﻴﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﻴﺪ‪ .‬ﺩﺭ ﺭﻣﺰ ﮔﺸﺎﻳﻲ ﺑﺎ ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ ‪ ،‬ﻫﺮ ﺩﻭ ﮐﻠﻴﺪﻱ‬ ‫ﮐﻪ ﺑﺮﺍﻱ ﻗﻔﻞ ﻭ ﺑﺎﺯ ﮐﺮﺩﻥ ﺍﻃﻼﻋﺎﺕ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ ﻳﮑﺴﺎﻥ ﻣﻲ ﺑﺎﺷﺪ‪ .‬ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﮐﻪ ﻫﺮ ﺩﻭ ﻃﺮﻑ ﺍﺯ ﻳﮏ ﮐﻠﻴﺪ ﻳﮑﺴﺎﻥ‬ ‫ﺑﻬﺮﻩ ﻣﻲ ﺑﺮﻧﺪ ﮐﻪ ﺑﺎﻳﺪ ﻧﺰﺩ ﺧﻮﺩﺷﺎﻥ ﺍﻣﻦ ﺑﺎﺷﺪ‪.‬‬ ‫ﺗﻮﺟﻪ ﮐﻨﻴﺪ ﮐﻪ ﻣﻔﻬﻮﻡ ﮐﻠﻴﺪ ﺩﺭ ﻣﺒﺎﺣﺚ ﻣﺮﺗﺒﻂ ‪ ،‬ﻋﻤﻮﻣﺎ ﻳﮏ ﺁﺭﺍﻳﻪ ﺍﺯ ﺑﺎﻳﺖ ﻫﺎ ﻣﻲ ﺑﺎﺷﺪ ﮐﻪ ﺑﺮ ﺍﺳﺎﺱ ﻧﻮﻉ ﺍﻣﻨﻴﺖ ﻃﻮﻝ‬ ‫ﻣﺘﻔﺎﻭﺗﻲ ﺩﺍﺭﺩ‪.‬ﻣﺜﻼ ‪ ٠١١٠١١٠٠١١٠٠١٠١١١٠٠١‬ﻣﻲ ﺗﻮﺍﻧﺪ ﻳﮏ ﮐﻠﻴﺪ ﺑﺎﺷﺪ‪.‬ﺍﻟﺒﺘﻪ ﻋﻤﻮﻣﺎ ﮐﻠﻴﺪ ﻫﺎ ﺩﺭ ﻣﺒﻨﺎﻱ ‪ ١٦‬ﻧﻤﺎﻳﺶ‬ ‫ﺩﺍﺩﻩ ﻣﻲ ﺷﻮﻧﺪ‪ .‬ﺑﻪ ﻫﺮ ﺣﺎﻝ ﻭﻇﻴﻔﻪ ﻣﺤﺎﻓﻈﺖ ﺍﺯ ﮐﻠﻴﺪ ﺑﺮ ﻋﻬﺪﻩ ﺩﺍﺭﻧﺪﻩ ﺁﻥ ﺍﺳﺖ!‬ ‫ﺩﺭ ﺷﮑﻞ ﺯﻳﺮ ﻧﺤﻮﻩ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﺍﻃﻼﻋﺎﺕ ﺗﻮﺳﻂ ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ ﻧﻤﺎﻳﺶ ﺩﺍﺩﻩ ﺷﺪﻩ ﺍﺳﺖ‪:‬‬

‫ﺍﻣﺎ ﻧﻮﻋﻲ ﺩﻳﮕﺮ ﺍﺯ ﺭﻣﺰﮔﺬﺍﺭﻱ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﺍﺳﺎﺱ ‪ SSL‬ﻧﻴﺰ ﻣﻲ ﺑﺎﺷﺪ‪.‬ﺩﺭ ﺍﻳﻦ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﮐﻪ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﻧﺎ ﻣﺘﻘﺎﺭﻥ ﻳﺎ ﺭﻣﺰ‬ ‫ﮔﺬﺍﺭﻱ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻧﺎﻣﻴﺪﻩ ﻣﻲ ﺷﻮﺩ ‪ ،‬ﺩﻭ ﻧﻮﻉ ﮐﻠﻴﺪ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ‪:‬‬ ‫•‬

‫ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ‬

‫•‬

‫ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ‬

‫]‪[٦‬‬ ‫]‪[١٥‬‬

‫ﺩﺭ ﺍﻳﻦ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ ﮐﻪ ﺍﮔﺮ ﺩﺍﺩﻩ ﺍﻱ ﺑﺎ ﻳﮏ ﮐﻠﻴﺪ ﻗﻔﻞ ﺷﺪ ‪ ،‬ﺑﺎ ﻫﻤﺎﻥ ﮐﻠﻴﺪ ﺑﺎﺯ ﻧﻤﻲ ﺷﻮﺩ ﻭ ﻓﻘﻂ ﺍﻣﮑﺎﻥ ﺑﺎﺯ ﺷﺪﻥ‬ ‫ﺁﻥ ﺑﺎ ﮐﻠﻴﺪ ﻣﺘﻨﺎﻇﺮ ﺁﻥ ﻭﺟﻮﺩ ﺩﺍﺭﺩ‪ .‬ﺍﻳﻦ ﮐﻠﻴﺪ ﻣﺘﻨﺎﻇﺮ ﻧﺰﺩ ﻃﺮﻑ ﻣﻘﺎﺑﻞ ﺍﺳﺖ ﻭ ﺍﻣﮑﺎﻥ ﺑﺪﺳﺖ ﺁﻭﺭﺩﻥ ﺁﻥ ﺍﺯ ﮐﻠﻴﺪ ﺩﻳﮕﺮ ﻭﺟﻮﺩ‬ ‫ﻧﺪﺍﺭﺩ‪ .‬ﺑﻪ ﻋﺒﺎﺭﺕ ﺳﺎﺩﻩ ﺗﺮ ﺍﮔﺮ ﺷﻤﺎ ﺩﺭ ﺧﺎﻧﻪ ﺗﺎﻥ ﺭﺍ ﺑﺎ ﮐﻠﻴﺪ ‪ A‬ﻗﻔﻞ ﻧﻤﻮﺩﻳﺪ ‪ ،‬ﺗﻨﻬﺎ ﺍﻣﮑﺎﻥ ﺑﺎﺯ ﺷﺪﻥ ﺁﻥ ﺑﺎ ﮐﻠﻴﺪ ﻣﺘﻨﺎﻇﺮ ‪ B‬ﻭﺟﻮﺩ‬

‫ﺩﺍﺭﺩ ﻭ ﺍﻳﻦ ﺩﺭ ﺣﺎﻟﻴﺴﺖ ﮐﻪ ﺍﻣﮑﺎﻥ ﻓﻬﻤﻴﺪﻥ ﺁﻧﮑﻪ ﮐﻠﻴﺪ ‪ B‬ﭼﮕﻮﻧﻪ ﺳﺎﺧﺘﻪ ﺷﺪﻩ ﺍﺳﺖ ﺑﺮﺍﻱ ﺷﻤﺎ ﻧﻴﺰ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪ .‬ﺣﺎﻝ ﺍﮔﺮ ﮐﻠﻴﺪ‬ ‫ﺧﻮﺩ ﺭﺍ ﺩﺭﻭﻥ ﺩﺭ ﻧﻴﺰ ﺟﺎ ﺑﮕﺬﺍﺭﻳﺪ ‪ ،‬ﻣﺴﺎﻟﻪ ﺍﻱ ﻧﻴﺴﺖ!‬ ‫ﺣﺎﻝ ﺑﻪ ﺑﺤﺚ ﺑﺎﺯ ﻣﻲ ﮔﺮﺩﻳﻢ ‪ :‬ﺷﻤﺎ ﺩﺭﺧﻮﺍﺳﺖ ﺩﺍﺩﻩ ﺍﻱ ﺭﺍ ﺍﺯ ﻳﮏ ﺳﺮﻭﺭ ﺍﻣﻦ ﻣﻲ ﮐﻨﻴﺪ ‪ ،‬ﺳﺮﻭﺭ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺭﺍ ﺑﺮﺍﻱ ﺷﻤﺎ‬ ‫ﺍﺭﺳﺎﻝ ﻣﻲ ﮐﻨﺪ‪ .‬ﺷﻤﺎ ﺩﺍﺩﻩ ﻫﺎﻱ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﺍﻳﻦ ﮐﻠﻴﺪ ﻗﻔﻞ ﻣﻲ ﮐﻨﻴﺪ ﻭ ﺑﺮﺍﻱ ﺳﺮﻭﺭ ﺍﺭﺳﺎﻝ ﻣﻲ ﮐﻨﻴﺪ‪ .‬ﺣﺎﻝ ﺍﮔﺮ ﺍﻳﻦ ﻭﺳﻂ ﮐﺴﻲ‬ ‫ﺧﻮﺍﺳﺖ ﺩﺍﺩﻩ ﻫﺎ ﺭﺍ ﺑﺒﻴﻨﺪ]‪ ، [١٨‬ﻧﻤﻲ ﺗﻮﺍﻧﺪ ‪ ،‬ﭼﺮﺍﮐﻪ ﺍﻳﻦ ﺩﺍﺩﻩ ﻫﺎ ﺑﺎ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺑﺎﺯ ﻧﻤﻲ ﺷﻮﻧﺪ!‪ .‬ﺩﺭ ﻃﺮﻑ ﻣﻘﺎﺑﻞ ﺳﺮﻭﺭ ﺑﺎ ﮐﻠﻴﺪ‬ ‫ﺧﺼﻮﺹ ﺧﻮﺩ ﺩﺍﺩﻩ ﻫﺎ ﺭﺍ ﺭﻣﺰ ﮔﺸﺎﻳﻲ ﻣﻲ ﮐﻨﺪ ﻭ ﺍﺯ ﺁﻥ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ‪.‬‬ ‫ﺷﮑﻞ ﺯﻳﺮ ﺭﻭﻧﺪ ﺫﮐﺮ ﺷﺪﻩ ﺭﺍ ﻣﻲ ﺭﺳﺎﻧﺪ ‪:‬‬

‫ﺗﻮﺟﻪ ‪ :‬ﺩﺭ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺭﻭﻧﺪ ﺑﺮﻋﮑﺲ ﺍﺳﺖ‪).‬ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﭼﻴﺰﻱ ﺟﺰ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﺩﺍﺩﻩ ﻫﺎ ﺑﺎ ﮐﻠﻴﺪ‬ ‫ﺧﺼﻮﺻﻲ ﻓﺮﺳﺘﻨﺪﻩ ﻧﻴﺴﺖ(‪ .‬ﻣﺎ ﺩﺭ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻣﻲ ﺧﻮﺍﻫﻴﻢ ﺑﺒﻴﻨﻴﻢ ﮐﻪ ﺁﻳﺎ ﺩﺍﺩﻩ ﻫﺎﻱ ﺍﺭﺳﺎﻝ ﺷﺪﻩ ﻭﺍﻗﻌ ﹰﺎ ﺍﺯ ﻃﺮﻑ ﺷﺨﺼﻲ‬ ‫ﺍﺳﺖ ﮐﻪ ﺍﺩﻋﺎ ﻣﻲ ﮐﻨﺪ ﻳﺎ ﺧﻴﺮ؟‬ ‫ﺑﻪ ﻃﻮﺭ ﺳﺎﺩﻩ ﮐﺎﺭﺑﺮ ﻧﺎﻡ ﺧﻮﺩ ﺭﺍ ﺑﺎ ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺧﻮﺩ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﻣﻲ ﮐﻨﺪ‪ .‬ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﻫﻤﻪ ﺑﺎ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻭﻱ ﻣﻲ‬ ‫ﺗﻮﺍﻧﻨﺪ ﻧﺎﻡ ﻭﻱ ﺭﺍ ﺭﻣﺰ ﮔﺸﺎﻳﻲ ﮐﻨﻨﺪ ﻭ ﺍﻳﻦ ﺻﺤﻴﺢ ﺍﺳﺖ! ﭼﺮﺍﮐﻪ ﻫﻴﭻ ﮐﺲ ﺩﻳﮕﺮ ﻗﺎﺩﺭ ﻧﻴﺴﺖ ﺩﺍﺩﻩ ﺍﻱ ﺗﻮﻟﻴﺪ ﮐﻨﺪ ﮐﻪ ﻧﺘﻴﺠﻪ ﺑﺎﺯ‬ ‫ﺷﺪﻥ ﺁﻥ ﺑﺎ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺷﺨﺺ ﺍﻣﻀﺎ ﮐﻨﻨﺪﻩ ﺑﺮﺍﺑﺮ ﺑﺎﺷﺪ!‪.‬‬ ‫ﺍﻟﺒﺘﻪ ﺩﺭ ﻋﻤﻞ ﺑﻬﺘﺮ ﺍﺳﺖ ﺍﺯ ﺗﻮﺍﺑﻊ ‪ Hash‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ‪ .‬ﭼﺮﺍﮐﻪ ﺩﺭ ﺣﺎﻟﺖ ﻓﻮﻕ ‪ ،‬ﺍﻭﻻ ﻧﺎﻡ ﮐﺎﺭﺑﺮ ﺭﺍ ﺑﺎﻳﺪ ﻓﻘﻂ ﮐﺎﺭﺑﺮ ﻭ ﺳﺮﻭﺭ‬ ‫ﺑﺪﺍﻧﻨﺪ ﻭ ﺩﻳﮕﺮ ﺁﻧﮑﻪ ﺍﺯ ﮐﺠﺎ ﻣﻌﻠﻮﻡ ﮐﻪ ﺩﺍﺩﻩ ﺍﺭﺳﺎﻟﻲ ﻫﻤﺎﻧﻲ ﺍﺳﺖ ﮐﻪ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﮐﺎﺭﺑﺮ ﺑﺎ ﺁﻥ ﺑﻮﺩﻩ ﺍﺳﺖ)ﺑﻪ ﻋﺒﺎﺭﺕ ﺩﻳﮕﺮ‬ ‫ﺷﺎﻳﺪ ﺩﺭ ﻣﻴﺎﻥ ﺭﺍﻩ ﻣﺘﻦ ﺍﻃﻼﻋﺎﺕ ﺗﻐﻴﻴﺮ ﮐﺮﺩ(‬ ‫ﻫﻤﺎﻧﻄﻮﺭ ﮐﻪ ﺫﮐﺮ ﺷﺪ ‪ ،‬ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﺍﺯ ﺗﻮﺍﺑﻊ ‪ Hash‬ﮐﻪ ﻳﮏ ﻃﺮﻓﻪ ﻫﺴﺘﻨﺪ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ‪.‬ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﮐﻪ ﺍﮔﺮ ﺩﺍﺩﻩ ﺍﻱ‬ ‫‪ hash‬ﺷﺪ ‪ ،‬ﺩﻳﮕﺮ ﺑﻪ ﻫﻴﭻ ﻋﻨﻮﺍﻥ )ﻭ ﺗﻮﺳﻂ ﻫﻴﭻ ﮐﻠﻴﺪﻱ( ﻗﺎﺑﻞ ﺑﺮﮔﺸﺖ ﻧﻴﺴﺖ‪.‬‬ ‫ﺑﺪﻳﻦ ﻣﻨﻈﻮﺭ ﻣﺘﻦ ﻧﺎﻣﻪ ﺍﺑﺘﺪﺍ ‪ hash‬ﻣﻲ ﮔﺮﺩﺩ ﻭ ﺳﭙﺲ ﺗﻮﺳﻂ ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺍﻣﻀﺎ ﻣﻲ ﺷﻮﺩ‪.‬‬

‫ﺳﭙﺲ ﺍﻣﻀﺎ ﻭ ﻣﺘﻦ ﻧﺎﻣﻪ ﺍﺭﺳﺎﻝ ﻣﻲ ﺷﻮﺩ‪ .‬ﺩﺭ ﻃﺮﻑ ﺳﺮﻭﺭ ﻫﻢ ﺑﺎ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺩﺍﺩﻩ ‪ hash‬ﺷﺪﻩ ﺑﺪﺳﺖ ﻣﻲ ﺁﻳﺪ‪ .‬ﻣﺘﻦ ﺍﺭﺳﺎﻟﻲ‬ ‫ﻫﻢ ‪ hash‬ﻣﻲ ﺷﻮﺩ‪ .‬ﺣﺎﻝ ﺍﮔﺮ ﺍﻳﻦ ﺩﻭ ﻧﺘﻴﺠﻪ ﻳﮑﺴﺎﻥ ﺑﻮﺩ ‪ ،‬ﺩﺍﺩﻩ ﻫﺎ ﻭﺍﻗﻌ ﹰﺎ ﺍﺯ ﻃﺮﻑ ﮐﺴﻲ ﮐﻪ ﻣﺪﻋﻲ ﺁﻥ ﺍﺳﺖ ﺍﺭﺳﺎﻝ ﺷﺪﻩ‬ ‫ﺍﺳﺖ‪ .‬ﭼﺮﺍ ﮐﻪ ﺍﮔﺮ ﻣﺘﻦ ﻧﺎﻣﻪ ﻋﻮﺽ ﺷﻮﺩ ‪ ،‬ﻧﺘﻴﺠﻪ ‪ hash‬ﺁﻥ ﻫﻢ ﻣﺘﻔﺎﻭﺕ ﻭ ﻣﻘﺎﻳﺴﻪ ﻧﺘﻴﺠﻪ ﻳﮑﺴﺎﻧﻲ ﺭﺍ ﺑﺮ ﻧﻤﻲ ﮔﺮﺩﺍﻧﺪ‪.‬‬ ‫ﺩﺭ ﻧﻤﻮﺩﺍﺭ ﺯﻳﺮ ‪ ،‬ﺭﻭﻧﺪ ﮐﺎﺭ ﺭﺍ ﻣﺸﺎﻫﺪﻩ ﻣﻲ ﮐﻨﻴﺪ )ﻗﻄﻌﻪ ﻫﺎﻱ ﺧﺎﮐﺴﺘﺮﻱ ﺭﻧﮓ ﻧﺸﺎﻥ ﺩﻫﻨﺪﻩ ‪ Hash‬ﺷﺪﻥ ﻣﺘﻦ ﻧﺎﻣﻪ ﻣﻲ‬ ‫ﺑﺎﺷﻨﺪ(‬

‫‪ – ٣‬ﺳﺎﺧﺘﺎﺭ ﻭ ﺭﻭﻧﺪ ﺁﻏﺎﺯﻳﻦ ﭘﺎﻳﻪ ﮔﺬﺍﺭﻱ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﻣﻦ‬ ‫ﺩﺭ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﻗﺒﻞ ﺍﺯ ﺁﻧﮑﻪ ﺍﻃﻼﻋﺎﺗﻲ ﻣﺎﺑﻴﻦ ﺩﺭﺧﻮﺍﺳﺖ ﺩﻫﻨﺪﻩ ﻭ ﺳﺮﻭﺭ ﺭﺩ ﻭ ﺑﺪﻝ ﺷﻮﺩ ‪ ،‬ﻣﻲ ﺑﺎﻳﺴﺖ ﺍﺑﺘﺪﺍ ﺳﺮﻭﺭ ﺗﺼﺪﻳﻖ‬ ‫ﮔﺮﺩﺩ]‪. [٢‬‬ ‫ﺑﻪ ﻃﻮﺭ ﮐﻠﻲ ﻣﺮﺣﻠﻪ ﺁﻏﺎﺯﻳﻦ ﺷﺮﻭﻉ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺍﻣﻦ ]‪ [٣‬ﺍﺯ ﺩﻭ ﻓﺎﺯ ﺗﺸﮑﻴﻞ ﺷﺪﻩ ﺍﺳﺖ ‪ :‬ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﺭ ﻭ ﻣﺮﺣﻠﻪ‬ ‫ﺍﺧﺘﻴﺎﺭﻱ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﻣﺸﺘﺮﻱ‪ .‬ﺩﺭ ﻓﺎﺯ ﺗﺼﺪﻳﻖ ﻫﻮﻳﺖ ﺳﺮﻭﺭ ‪ ،‬ﺳﺮﻭﺭ ﺩﺭ ﺟﻮﺍﺏ ﺩﺭﺧﻮﺍﺳﺖ ﻣﺸﺘﺮﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺧﻮﺩ ﻭ ﻓﺮﻣﻮﻝ‬ ‫ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﺧﻮﺩ]‪ [٤‬ﺭﺍ ﺑﺮﺍﻱ ﻣﺸﺘﺮﻱ ﺍﺭﺳﺎﻝ ﻣﻲ ﮐﻨﺪ‪ .‬ﺳﭙﺲ ﻣﺸﺘﺮﻱ ﻳﮏ ﮐﻠﻴﺪ ﺍﺻﻠﻲ]‪ [٥‬ﮐﻪ ﺑﺎ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ]‪ [٦‬ﺳﺮﻭﺭ ﺭﻣﺰ‬ ‫ﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺍﺳﺖ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﻲ ﮐﻨﺪ ﻭ ﺳﭙﺲ ﺍﻳﻦ ﮐﻠﻴﺪ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺭﺍ ﺑﻪ ﺳﺮﻭﺭ ﺍﺭﺳﺎﻝ ﻣﻲ ﮐﻨﺪ‪ .‬ﺳﺮﻭﺭ ﮐﻠﻴﺪ ﺍﺻﻠﻲ ﺭﺍ‬ ‫ﺑﺎﺯﻳﺎﺑﻲ ﻣﻲ ﮐﻨﺪ ﻭ ﺧﻮﺩﺵ ﺭﺍ ﺑﺎ ﻓﺮﺳﺘﺎﺩﻥ ﭘﻴﻐﺎﻣﻲ ﺑﻪ ﻣﺸﺘﺮﻱ ﺗﺼﺪﻳﻖ ﻣﻲ ﻧﻤﺎﻳﺪ‪ .‬ﺩﺭﺧﻮﺍﺳﺖ ﻫﺎﻱ ﺑﻌﺪﻱ ﺑﺎ ﮐﻠﻴﺪ ﻫﺎﻳﻲ ﮐﻪ ﺍﺯ‬ ‫ﮐﻠﻴﺪ ﺍﺻﻠﻲ ﻣﺸﺘﻖ ﺷﺪﻩ ﺍﻧﺪ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﻭ ﺗﺼﺪﻳﻖ ﻣﻲ ﺷﻮﻧﺪ‪.‬‬ ‫ﺩﺭ ﻓﺎﺯ ﺩﻭﻡ ﮐﻪ ﺍﺧﺘﻴﺎﺭﻱ ﺑﻮﺩ ‪ ،‬ﺳﺮﻭﺭ ﻳﮏ ﭼﺎﻟﺶ]‪ [٧‬ﺭﺍ ﺑﺮﺍﻱ ﻣﺸﺘﺮﻱ ﺍﻳﺠﺎﺩ ﻣﻲ ﮐﻨﺪ ]ﺍﺭﺳﺎﻝ ﻣﻲ ﮐﻨﺪ[‪ .‬ﻣﺸﺘﺮﻱ ﻧﻴﺰ ﺧﻮﺩﺵ ﺭﺍ‬ ‫ﺑﺮﺍﻱ ﺳﺮﻭﺭ ﺑﺎ ﺍﺭﺳﺎﻝ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﻭ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺧﻮﺩ ]‪ [٨‬ﻧﺴﺒﺖ ﺑﻪ ﺗﺼﺪﻳﻖ ﺧﻮﺩ ﺍﻗﺪﺍﻡ ﻣﻲ ﻧﻤﺎﻳﺪ‪.‬‬

‫ﺍﻟﮕﻮﺭﻳﺘﻢ ﻫﺎﻱ ﺯﻳﺎﺩﻱ ﺟﻬﺖ ﭘﻨﻬﺎﻥ ﺳﺎﺯﻱ ﺩﺭ ‪ SSL‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﻧﺪ‪ .‬ﺩﺭ ﻣﺮﺣﻠﻪ ﺁﻏﺎﺯﻳﻦ ﺷﺮﻭﻉ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺍﻣﻦ ﺍﺯ ﺍﻟﮕﻮﺭﻳﺘﻢ‬ ‫‪ RSA public-key cryptosystem‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﺩ‪ .‬ﺑﻌﺪ ﺍﺯ ﺭﺩ ﻭ ﺑﺪﻝ ﺷﺪﻥ ﮐﻠﻴﺪ ﻫﺎ ﻧﻴﺰ ﺍﻟﮕﻮﺭﻳﺘﻢ ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ‬ ‫ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﺷﻮﻧﺪ‪ .‬ﺍﺯ ﺟﻤﻠﻪ ‪ triple-DES ، DES ، IDEA ، RC٤ ، RC٢ :‬ﻭ ‪. MD٥‬‬ ‫ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﺎﻱ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﻫﻢ ﺍﺯ ﻗﻮﺍﻧﻴﻦ ‪ X.٥٠٩‬ﭘﻴﺮﻭﻱ ﻣﻲ ﮐﻨﻨﺪ‪).‬ﺳﺎﺧﺘﺎﺭ ﺩﺭﺧﺘﻲ ‪ CA‬ﻫﺎ ﻭ ﺍﻣﻀﺎﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﺎ ﮐﻪ ﺩﺭ‬ ‫ﺍﺩﺍﻣﻪ ﺫﮐﺮ ﺧﻮﺍﻫﺪ ﺷﺪ ‪ ،‬ﻫﻤﮕﻲ ﺑﺮ ﺍﺳﺎﺱ ﺍﻳﻦ ﺍﺳﺘﺎﻧﺪﺍﺭﺩ ﺍﺳﺖ(‬

‫‪ –٤‬ﭘﺮﻭﺗﮑﻞ ﻫﺎﻱ ﻣﺸﺎﺑﻪ‬ ‫]‪ TLS[٩‬ﻫﻢ ﭘﺮﻭﺗﮑﻞ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺑﺴﻴﺎﺭ ﻣﺸﺎﺑﻪ ‪ SSL ٣,٠‬ﻣﻲ ﺑﺎﺷﺪ‪.‬‬ ‫ﻫﻤﭽﻨﻴﻦ ﭘﺮﻭﺗﮑﻞ ]‪ WTLS[١٠‬ﮐﻪ ﻣﺨﺼﻮﺹ ﺷﺒﮑﻪ ﻫﺎﻱ ﺑﻴﺴﻴﻢ ﺍﺳﺖ ﻭ ﺩﺭ ]‪ WAP [١١‬ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮔﺮﺩﺩ‪.‬‬

‫‪ –٥‬ﻣﻔﻬﻮﻡ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺩﺭ ﭘﺮﻭﺗﮑﻞ ‪SSL‬‬ ‫ﺩﺭ ﺍﻳﻨﺠﺎ ﻧﻴﺎﺯ ﺍﺳﺖ ﮐﻪ ﻳﮏ ﺑﺤﺚ ﮐﻠﻲ ﺩﺭ ﻣﻮﺭﺩ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ]‪ [١٢‬ﻣﻮﺭﺩ ﻧﻴﺎﺯ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺻﻮﺭﺕ ﮔﻴﺮﺩ‪.‬ﺑﻪ ﻃﻮﺭ ﻋﻤﻮﻡ )ﻏﻴﺮ ﺍﺯ ﺑﺤﺚ‬ ‫‪ (SSL‬ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﺎ ﺟﻨﺒﻪ ﺍﻋﺘﺒﺎﺭ ﺳﻨﺠﻲ ﺩﺍﺭﻧﺪ‪ .‬ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﮐﻪ ﺍﮔﺮ ﺷﻤﺎ ﺩﺭ ﻳﮏ ﺑﺤﺚ ﺧﺎﺹ ﺩﺍﺭﺍﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺑﺎﺷﻴﺪ ‪ ،‬ﺑﻪ‬ ‫ﺷﻤﺎ ﺍﻋﺘﻤﺎﺩ ﺑﻴﺸﺘﺮﻱ ﻣﻲ ﮐﻨﻨﺪ‪.‬ﺍﻣﺎ ﻣﻤﮑﻦ ﺍﺳﺖ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ﻭﻟﻲ ﮐﺎﺭ ﺧﻮﺩ ﺭﺍ ﻫﻢ ﺑﻪ ﻧﺤﻮ ﺍﺣﺴﻨﺖ ﺍﻧﺠﺎﻡ ﺩﻫﻴﺪ‪.‬ﺑﻪ‬ ‫ﻃﻮﺭ ﻣﺜﺎﻝ ﺷﻤﺎ ﻗﻬﺮﻣﺎﻥ ﻣﺴﺎﺑﻘﺎﺕ ﻓﺮﻣﻮﻝ ‪ ١‬ﺟﻬﺎﻥ ﻫﺴﺘﻴﺪ ‪ ،‬ﺍﻣﺎ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻧﺪﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ ‪ ،‬ﻫﺮﮔﺰ ﺍﺟﺎﺯﻩ‬ ‫ﻧﺨﻮﺍﻫﻴﺪ ﺩﺍﺷﺖ ﮐﻪ ﺩﺭ ﺷﻬﺮ ﺗﺮﺩﺩ ﮐﻨﻴﺪ!‬ ‫ﺩﺭ ﻣﻮﺭﺩ ‪ SSL‬ﻫﻢ ﺗﻘﺮﻳﺒﺎ ﺑﺤﺚ ﺑﻪ ﻫﻤﻴﻦ ﮔﻮﻧﻪ ﺍﺳﺖ ﺑﺎ ﺍﻳﻦ ﺗﻔﺎﻭﺕ ﮐﻪ ﺫﺍﺕ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺑﺤﺚ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﺎ‬ ‫ﻃﺮﺍﺣﻲ ﺷﺪﻩ ﺍﺳﺖ ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﮐﻪ ﺍﮔﺮ ﺩﺍﺭﺍﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻧﺒﺎﺷﻴﺪ ‪ ،‬ﻗﺎﺩﺭ ﻧﺨﻮﺍﻫﻴﺪ ﺑﻮﺩ ﮐﻪ ﻳﮏ ﭘﻴﺎﺩﻩ ﺳﺎﺯﻱ ﺍﺯ ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺭﺍ‬ ‫ﺩﺍﺷﺘﻪ ﺑﺎﺷﻴﺪ‪.‬ﺷﺎﻳﺪ ﺩﺭ ﻋﺎﻟﻢ ﺭﺍﻧﺪﻥ ﺍﺗﻮﻣﺒﻴﻞ ﺑﺪﻳﻦ ﺻﻮﺭﺕ ﺗﻌﺒﻴﺮ ﺷﻮﺩ ﮐﻪ ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺷﻤﺎ ﺩﺍﺭﺍﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻧﺒﺎﺷﻴﺪ ‪ ،‬ﻗﺎﺩﺭ‬ ‫ﺑﻪ ﺭﺍﻧﻨﺪﮔﻲ ﻫﻢ ﻧﻴﺴﺘﻴﺪ! ﺍﻳﻦ ﺗﺸﺎﺑﻪ ﺍﺯ ﺟﻬﺎﺗﻲ ﺻﺤﻴﺢ ﻭ ﺍﺯ ﺟﻬﺎﺗﻲ ﻏﻠﻂ ﺍﺳﺖ ‪ .‬ﺷﺎﻳﺪ ﺑﺮﺩﺍﺷﺖ ﺻﺤﻴﺢ ﺗﺮ ﺑﻪ ﺍﻳﻦ ﺻﻮﺭﺕ ﺑﺎﺷﺪ‬ ‫ﮐﻪ ﺍﮔﺮﭼﻪ ﻗﺎﺩﺭ ﻧﺨﻮﺍﻫﻴﺪ ﺑﻮﺩ ﺑﺪﻭﻥ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺭﺍﻧﻨﺪﮔﻲ ﮐﻨﻴﺪ ‪ ،‬ﺍﻣﺎ ﻗﺎﺩﺭ ﻫﺴﺘﻴﺪ ﮐﻪ ﺧﻮﺩ ﺑﺮﺍﻱ ﺧﻮﺩ ﻳﮏ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺻﺎﺩﺭ ﮐﺮﺩﻩ‬ ‫ﻭ ﺳﭙﺲ ﺑﻪ ﺭﺍﻧﻨﺪﮔﻲ ﺑﭙﺮﺩﺍﺯﻳﺪ!)ﻫﺮﭼﻨﺪ ﺍﻳﻦ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺍﺯ ﻧﻈﺮ ﺩﻳﮕﺮﺍﻥ ﮐﺎﻣﻼ ﺑﻲ ﺍﺭﺯﺵ ﺍﺳﺖ!(‪.‬‬ ‫ﻃﺒﻖ ﺑﺤﺚ ﻓﻮﻕ ‪ ،‬ﺷﻤﺎ ﻗﺎﺩﺭ ﺧﻮﺍﻫﻴﺪ ﺑﻮﺩ ﺑﺪﻭﻥ ﭘﺮﺩﺍﺧﺖ ﻫﻴﭻ ﻫﺰﻳﻨﻪ ﺍﻱ ﻳﮏ ﭘﺮﻭﺗﮑﻞ ‪ SSL‬ﺭﺍ ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﻭ ﺍﺳﺘﻔﺎﺩﻩ‬ ‫ﻧﻤﺎﻳﻴﺪ‪.‬ﻧﻤﻮﻧﻪ ﺑﺎﺭﺯ ﺍﻳﻦ ﺍﺳﺘﻔﺎﺩﻩ ﺩﺭ ﺷﺒﮑﻪ ﻫﺎﻱ ﺩﺍﺧﻠﻲ ﻳﺎ ‪ Intranet‬ﻣﻲ ﺑﺎﺷﺪ‪.‬‬

‫‪ –٦‬ﻣﺮﺍﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ‬ ‫ﺩﺭ ‪ SSL‬ﺑﻪ ﻣﺮﺍﮐﺰﻱ ﮐﻪ ﺍﻗﺪﺍﻡ ﺑﻪ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻣﻲ ﮐﻨﻨﺪ ‪" ،‬ﻣﺮﮐﺰ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ " ]‪ [١٣‬ﻳﺎ ﺑﻪ ﺍﺧﺘﺼﺎﺭ ‪ CA‬ﮔﻔﺘﻪ ﻣﻲ‬ ‫ﺷﻮﺩ‪.‬‬

‫ﺍﻳﻦ ﭘﺮﻭﺗﮑﻞ ﺍﺯ ﻳﮏ ﺷﺨﺺ ﺛﺎﻟﺚ ]‪ ) [١٤‬ﮐﻪ ﻫﻤﺎﻥ ‪ CA‬ﻣﻲ ﺑﺎﺷﺪ( ﺑﺮﺍﻱ ﺗﺸﺨﻴﺺ ﻫﻮﻳﺖ ﻃﺮﻓﻴﻦ ﻳﮏ ﺗﺮﺍﮐﻨﺶ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ‬ ‫ﮐﻨﺪ‪ .‬ﺩﺭ ﻭﺍﻗﻊ ﻳﮏ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻣﻌﻴﻦ ﻣﻲ ﮐﻨﺪ ﮐﻪ ﺁﻳﺎ ﺷﺨﺼﻲ ﮐﻪ ﺩﺍﺭﻧﺪﻩ ﺁﻥ ﺍﺳﺖ ‪ ،‬ﻭﺍﻗﻌ ﹰﺎ ﻫﻤﺎﻧﻲ ﺍﺳﺖ ﮐﻪ ﺍﺩﻋﺎ ﻣﻲ ﮐﻨﺪ ﻳﺎ‬ ‫ﺧﻴﺮ؟‬ ‫ﺩﺭ ﺷﮑﻞ ﺯﻳﺮ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﻳﮏ ﺭﻭﻧﺪ ﺩﺭﺧﻮﺍﺳﺖ ﺻﺪﻭﺭ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺗﻮﺳﻂ ﻳﮏ ﺳﺮﻭﻳﺲ ﺩﻫﻨﺪﻩ ) ﻗﺪﻡ ﻫﺎﻱ ‪ ٢ ، ١‬ﻭ ‪ (٣‬ﻭ ﺩﺭ‬ ‫ﺍﺩﺍﻣﻪ ﺁﻥ ﺩﺭﺧﻮﺍﺳﺖ ﮐﺎﺭﺑﺮ ﺑﺮﺍﻱ ﻳﮏ ﺳﺮﻭﺭ ﺩﺍﺭﺍﻱ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻭ ﭼﮕﻮﻧﮕﻲ ﻣﻄﻤﺌﻦ ﺷﺪﻥ ﻭﻱ ﺍﺯ ﻣﻌﺘﺒﺮ ﺑﻮﺩﻥ ﺁﻥ ﺳﺮﻭﺭ ﺭﺍ‬ ‫ﺑﺒﻴﻨﻴﺪ)ﻗﺪﻡ ﻫﺎﻱ ‪ ٦ ، ٥ ، ٤‬ﻭ ‪: (٧‬‬

‫‪ –٧‬ﻣﺮﺍﺣﻞ ﮐﻠﻲ ﺑﺮﻗﺮﺍﺭﻱ ﻭ ﺍﻳﺠﺎﺩ ﺍﺭﺗﺒﺎﻁ ﺍﻣﻦ ﺩﺭ ﻭﺏ‬ ‫ﺑﻪ ﻃﻮﺭ ﺳﺎﺩﻩ ﻣﺮﺍﺣﻠﻲ ﮐﻪ ﺩﺭ ﺍﻳﺠﺎﺩ ﻳﮏ ﺍﺭﺗﺒﺎﻁ ﺍﻣﻦ ‪ SSL‬ﺩﺭ ‪ http‬ﻃﻲ ﻣﻲ ﺷﻮﺩ ‪ ،‬ﺑﻪ ﺻﻮﺭﺕ ﺯﻳﺮ ﻣﻲ ﺑﺎﺷﺪ ‪:‬‬ ‫‪ ‐١‬ﮐﺎﺭﺑﺮ ﺩﺭﺧﻮﺍﺳﺖ ﺧﻮﺩ ﺭﺍ ﺍﺯ ﻃﺮﻳﻖ ﻣﺮﻭﺭﮔﺮ ﺑﻪ ﻳﮏ ﺻﻔﺤﻪ ﺍﻣﻦ ﺍﺭﺳﺎﻝ ﻣﻲ ﮐﻨﺪ)ﺁﺩﺭﺱ ﺍﻳﻦ ﺻﻔﺤﻪ ﻣﻌﻤﻮﻻ ﺑﺎ‬ ‫‪ https://‬ﺷﺮﻭﻉ ﻣﻲ ﺷﻮﺩ(‬ ‫‪ ‐٢‬ﻭﺏ ﺳﺮﻭﺭ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ]‪ [٦‬ﺧﻮﺩ ﺭﺍ ﺑﻪ ﻫﻤﺮﺍﻩ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺧﻮﺩ ﺑﺮﺍﻱ ﮐﺎﺭﺑﺮ ﺍﺭﺳﺎﻝ ﻣﻲ ﮐﻨﺪ‪.‬‬

‫‪ ‐٣‬ﻣﺮﻭﺭﮔﺮ ﭼﮏ ﻣﻲ ﮐﻨﺪ ﮐﻪ ﺁﻳﺎ ﺍﻳﻦ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺗﻮﺳﻂ ﻳﮏ ﻣﺮﮐﺰ ﻣﻮﺭﺩ ﺍﻃﻤﻴﻨﺎﻥ ﺻﺎﺩﺭ ﺷﺪﻩ ﺍﺳﺖ ﻭ ﺍﻳﻨﮑﻪ ﺁﻳﺎ ﺍﻳﻦ‬ ‫ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﻨﻮﺯ ﺍﻋﺘﺒﺎﺭ ﺩﺍﺭﺩ ؟ ﻭ ﻫﻤﭽﻨﻴﻦ ﺁﻳﺎ ﺍﻳﻦ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻣﺮﺗﺒﻂ ﺑﺎ ﺳﺎﻳﺖ ﺩﺭﺧﻮﺍﺳﺘﻲ ﻣﻲ ﺑﺎﺷﺪ؟‬ ‫‪ ‐٤‬ﺳﭙﺲ ﻣﺮﻭﺭﮔﺮ ﺍﺯ ﺍﻳﻦ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ]‪ [٦‬ﺩﺭﻳﺎﻓﺖ ﺷﺪﻩ ﺍﺯ ﻃﺮﻑ ﺳﺮﻭﺭ ﺍﺳﺘﻔﺎﺩﻩ ﻣﻲ ﮐﻨﺪ ﺳﭙﺲ ﻳﮏ ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ‬

‫]‪[١٤‬‬

‫ﺗﺼﺎﺩﻓﻲ ﺭﺍ ﺗﻮﻟﻴﺪ ﻣﻲ ﮐﻨﺪ ﻭ ﺗﻮﺳﻂ ﺁﻥ ﺗﻤﺎﻡ ﺩﺍﺩﻩ ﻫﺎ ﻭ ‪ URL‬ﺭﺍ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﻣﻲ ﮐﻨﺪ‪ .‬ﺩﺭ ﻧﻬﺎﻳﺖ ﻫﻢ ﺩﺍﺩﻩ ﻫﺎﻱ ﺭﻣﺰ‬ ‫ﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺭﺍ ﺑﻪ ﻫﻤﺮﺍﻩ ﺧﻮﺩ ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ ﺗﻮﻟﻴﺪﻱ ‪ ،‬ﻣﺠﺪﺩﺍ ﺗﻮﺳﻂ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺳﺮﻭﺭ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﮐﺮﺩﻩ ﻭ‬ ‫ﻧﺘﻴﺠﻪ ﺭﺍ ﺑﻪ ﺳﺮﻭﺭ ﺍﺭﺳﺎﻝ ﻣﻲ ﮐﻨﺪ‪.‬‬ ‫]‪[١٥‬‬

‫‪ ‐٥‬ﻭﺏ ﺳﺮﻭﺭ ﺗﻮﺳﻂ ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ‬

‫ﺧﻮﺩ‪ ،‬ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺭﺍ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﺁﻥ ﺳﺎﻳﺮ‬

‫ﺩﺍﺩﻩ ﻫﺎ ﻭ ‪ URL‬ﺭﺍ ﻧﻴﺰ ﺭﻣﺰﮔﺸﺎﻳﻲ ﻣﻲ ﻧﻤﺎﻳﺪ‪.‬‬ ‫‪ ‐٦‬ﻭﺏ ﺳﺮﻭﺭ ‪ html ،‬ﺩﺭﺧﻮﺍﺳﺘﻲ ﺭﺍ ﺑﺎ ﮐﻤﮏ ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﻭ ﺑﻪ ﮐﺎﺭﺑﺮ ﺑﺎﺯ ﻣﻲ ﮔﺮﺩﺍﻧﺪ‪.‬‬ ‫‪ ‐٧‬ﻣﺮﻭﺭﮔﺮ ﻧﻴﺰ ﺩﺍﺩﻩ ﻫﺎﻱ ﺩﺭﻳﺎﻓﺘﻲ ﺭﺍ ﺑﺎ ﮐﻤﮏ ﮐﻠﻴﺪ ﻣﺘﻘﺎﺭﻥ ﺧﻮﺩ ﺑﺎﺯﮔﺸﺎﻳﻲ ﮐﺮﺩﻩ ﻭ ﺑﻪ ﮐﺎﺭﺑﺮ ﻧﻤﺎﻳﺶ ﻣﻲ ﺩﻫﺪ‪.‬‬ ‫ﻫﻤﺎﻧﻄﻮﺭ ﮐﻪ ﺍﺯ ﻣﺮﺣﻠﻪ ‪ ٣‬ﭘﻴﺪﺍﺳﺖ ‪ ،‬ﺩﺭ ﺍﻳﻦ ﻣﺮﺣﻠﻪ ﺍﺳﺖ ﮐﻪ ﻣﻴﺰﺍﻥ ﺍﻋﺘﺒﺎﺭ ‪ CA‬ﻣﺸﺨﺺ ﻣﻲ ﺷﻮﺩ‪ .‬ﺩﺭ ﺻﻮﺭﺗﻲ ﮐﻪ ﺍﻳﻦ ‪ CA‬ﺑﻪ‬ ‫ﻫﺮ ﺩﻟﻴﻞ ﺍﺯ ﻧﻈﺮ ﻣﺮﻭﺭﮔﺮ ﺩﺍﺭﺍﻱ ﺍﻋﺘﺒﺎﺭ ﻭ ﺷﺮﺍﻳﻂ ﺧﺎﺻﻲ ﻧﺒﺎﺷﻨﺪ ‪ ،‬ﻫﺸﺪﺍﺭﻱ ﻣﺒﻨﻲ ﺑﺮ ﻋﺪﻡ ﺍﻣﻦ ﺑﻮﺩﻥ ﺳﺎﻳﺖ ﻣﻮﺭﺩ ﻧﻈﺮ ﺑﻪ ﮐﺎﺭﺑﺮ‬ ‫ﺍﺭﺍﻳﻪ ﻣﻲ ﺩﻫﺪ‪ .‬ﺗﻮﺟﻪ ﮐﻨﻴﺪ ﮐﻪ ﺩﺭ ﺍﻳﻦ ﻣﻮﺭﺩ ﺗﻨﻬﺎ ﺑﻪ ﻫﺸﺪﺍﺭ ﺑﺴﻨﺪﻩ ﻣﻲ ﺷﻮﺩ ‪ ،‬ﺍﻃﻤﻴﻨﺎﻥ ﺑﻪ ﺁﻥ ﺑﻪ ﺷﻤﺎ ﻭ ﺷﺮﺍﻳﻂ ﺷﻤﺎ ﺑﺴﺘﮕﻲ‬ ‫ﺩﺍﺭﺩ‪ .‬ﺿﻤﻦ ﺁﻧﮑﻪ ﺍﻳﻦ ﻫﺸﺪﺍﺭ ﻫﺮﮔﺰ ﻧﻤﻲ ﺗﻮﺍﻧﺪ ﺑﻪ ﻣﻌﻨﺎﻱ ﻗﻄﻌﻲ ﻋﺪﻡ ﻭﺟﻮﺩ ﺍﻣﻨﻴﺖ ﺑﺎﺷﺪ‪.‬ﺣﺎﻝ ﺍﮔﺮ ﺷﻤﺎ ﻳﮏ ‪ CA‬ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ‬ ‫ﺭﺍﻩ ﺍﻧﺪﺍﺯﻱ ﮐﺮﺩﻳﺪ ‪ ،‬ﻣﺴﻠﻤﺎ ﻫﻴﭻ ﮐﺪﺍﻡ ﺍﺯ ﻣﺮﻭﺭﮔﺮ ﻫﺎ ﺷﻤﺎ ﺭﺍ ﻧﻤﻲ ﺷﻨﺎﺳﻨﺪ ﻭ ﺑﻨﺎﺑﺮﺍﻳﻦ ﮔﻮﺍﻫﻲ ﻫﺎﻱ ﺻﺎﺩﺭ ﺷﺪﻩ ﺍﺯ ﻃﺮﻑ ﺷﻤﺎ ﺭﺍ‬ ‫ﻧﺎ ﺍﻣﻦ ﻣﻲ ﭘﻨﺪﺍﺭﻧﺪ‪.‬ﺍﺯ ﺁﻧﺠﺎ ﮐﻪ ﮐﺎﺭﺑﺮﺍﻥ ﻋﺎﺩﻱ ﺍﻳﻨﺘﺮﻧﺖ ﻧﻴﺰ ﺍﻳﻦ ﻫﺸﺪﺍﺭ ﻫﺎ ﺭﺍ ﺟﺪﻱ ﺩﺭ ﻧﻈﺮ ﻣﻲ ﮔﻴﺮﻧﺪ ‪ ،‬ﺍﺯ ﺍﺩﺍﻣﻪ ﺗﺮﺍﮐﻨﺶ ﺑﺎ‬ ‫ﺳﺎﻳﺖ ﺷﻤﺎ ﺻﺮﻑ ﻧﻈﺮ ﺧﻮﺍﻫﻨﺪ ﮐﺮﺩ‪.‬‬

‫‪ –٨‬ﻧﮑﺎﺗﻲ ﺩﺭ ﻣﻮﺭﺩ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻫﺎ‬

‫•‬

‫ﺷﻤﺎ ﺩﺭ ﺻﻮﺭﺗﻲ ﺑﻪ ﻳﮏ ﺳﺎﻳﺖ ﺑﺎ ﻳﮏ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻣﻌﻴﻦ ﺍﻋﺘﻤﺎﺩ ﻣﻲ ﮐﻨﻴﺪ ﮐﻪ ﺁﻧﺮﺍ ﻳﮏ ‪ CA‬ﻣﻌﺘﺒﺮ )ﺣﺪﺍﻗﻞ ﻧﺰﺩ ﺷﻤﺎ(‬ ‫ﺍﻣﻀﺎ ﮐﺮﺩﻩ ﺑﺎﺷﺪ‪.‬ﺩﺭ ﻭﺍﻗﻊ ﺍﻳﻦ ﺍﻋﺘﻤﺎﺩ ﺷﻤﺎ ﺿﻤﻨﻲ ﺍﺳﺖ‪ .‬ﺑﻪ ﺍﻳﻦ ﺭﻭﻧﺪ ‪ ،‬ﺩﺭﺧﺖ ﺍﻋﺘﺒﺎﺭ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ]‪ [١٦‬ﻳﺎ ﻣﺴﻴﺮ‬ ‫ﮔﻮﺍﻫﻴﻨﺎﻣﻪ‬

‫•‬

‫]‪[١٧‬‬

‫ﮔﻔﺘﻪ ﻣﻲ ﺷﻮﺩ‪ .‬ﻣﻌﻤﻮﻻ ﻣﺮﻭﺭﮔﺮﻫﺎ ﺗﻌﺪﺍﺩﻱ ﺍﺯ ‪ CA‬ﻫﺎ ﻱ ﻣﻌﺮﻭﻑ ﺭﺍ ﺑﺮﺍﻱ ﺧﻮﺩ ﺩﺭ ﻧﻈﺮ ﻣﻲ ﮔﻴﺮﺩ‪.‬‬

‫‪ CA‬ﻫﺎﻱ ﻣﺘﻔﺎﻭﺗﻲ ﺩﺭ ﺍﻳﻨﺘﺮﻧﺖ ﻭﺟﻮﺩ ﺩﺍﺭﺩ ﮐﻪ ﺷﺎﻳﺪ ﻣﺸﻬﻮﺭﺗﺮﻳﻦ ﺁﻥ ‪ verisign‬ﺑﺎﺷﺪ‪.‬ﺑﻪ ﻫﺮ ﺣﺎﻝ ﻗﺮﺍﺭ ﻧﻴﺴﺖ ﺷﻤﺎ‬ ‫ﻫﻤﻴﺸﻪ ‪ ،‬ﺑﺎ ﺗﻮﺟﻪ ﺑﻪ ﺗﺮﺍﮐﻨﺶ ﺧﻮﺩ‪ ،‬ﺑﻪ ﺗﻤﺎﻡ ‪ CA‬ﻫﺎ )ﻳﺎ ﺑﻪ ﻋﺒﺎﺭﺕ ﺑﻬﺘﺮ ﺑﻪ ﺍﻧﻮﺍﻉ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺁﻧﻬﺎ( ﺍﻋﺘﻤﺎﺩ ﮐﻨﻴﺪ‪ .‬ﻳﮏ‬ ‫ﺭﺍﻩ ﻣﻨﺎﺳﺐ ﺑﺮﺍﻱ ﺗﺸﺨﻴﺺ ﺍﻳﻦ ﻣﻮﺿﻮﻉ ﻣﻴﺰﺍﻥ ﻣﺒﻠﻐﻲ ﺍﺳﺖ ﮐﻪ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻣﻮﺭﺩ ﻧﻈﺮ ﺗﺮﺍﮐﻨﺶ ﺷﻤﺎ ﺭﺍ ﺑﻴﻤﻪ ﻣﻲ‬ ‫ﮐﻨﺪ‪.‬ﺑﻪ ﻃﻮﺭ ﻣﺜﺎﻝ ﺣﺪﺍﮐﺜﺮ ﻣﺒﻠﻐﻲ ﮐﻪ ‪ iranSSL‬ﺗﺮﺍﮐﻨﺶ ﺷﻤﺎ ﺭﺍ ﺑﻴﻤﻪ ﻣﻲ ﮐﻨﺪ ‪ ١٠،٠٠٠‬ﺩﻻﺭ ﻣﻲ ﺑﺎﺷﺪ‪ .‬ﺍﻣﺎ‬ ‫‪ Verisign‬ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺍﻱ ﺩﺍﺭﺩ ﮐﻪ ﺗﺎ ‪ ٢٥٠،٠٠٠‬ﺩﻻﺭ ﺗﺮﺍﮐﻨﺶ ﺷﻤﺎ ﺭﺍ ﺑﻴﻤﻪ ﻣﻲ ﻧﻤﺎﻳﺪ‪).‬ﺑﺴﻴﺎﺭ ﻣﺸﺎﺑﻪ ﺑﺎ ﻭﺿﻌﻴﺖ‬ ‫ﺷﺮﮐﺖ ﻫﺎﻱ ﺑﻴﻤﻪ(‬

‫•‬

‫ﭘﺮﻭﺗﮑﻞ ‪ SSL‬ﺑﺮ ﺍﺳﺎﺱ ﻣﻴﺰﺍﻥ ﺍﻣﻦ ﺑﻮﺩﻥ ﺩﺳﺘﻪ ﺑﻨﺪﻱ ﻣﻲ ﺷﻮﻧﺪ‪ .‬ﺍﻳﻦ ﺩﺳﺘﻪ ﺑﻨﺪﻱ ﺑﺮ ﺍﺳﺎﺱ ﻣﻘﺪﺍﺭ ‪ bit‬ﻫﺎﻱ‬ ‫ﺗﻮﻟﻴﺪﻱ ﺑﻪ ﺍﺯﺍﺀ ﻫﺮ ﺑﺨﺶ ﺍﺯ ﺩﺍﺩﻩ ﺍﻱ ﺍﺳﺖ ﮐﻪ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﻣﻲ ﺷﻮﺩ‪.‬ﻣﺴﻠﻤﺎ ﻫﺮﭼﻪ ﺗﻌﺪﺍﺩ ﺍﻳﻦ ‪ bit‬ﻫﺎﻱ ﺗﻮﻟﻴﺪﻱ‬ ‫ﺑﻴﺸﺘﺮ ﺑﺎﺷﺪ ‪ ،‬ﺭﻣﺰﮔﺸﺎﻳﻲ ﺁﻥ ﺑﺪﻭﻥ ﮐﻠﻴﺪ ‪ ،‬ﺑﺴﻴﺎﺭ ﺳﺨﺖ ﺗﺮ ﻭ ﺑﺎ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮐﻠﻴﺪ ﻧﻴﺰ ﺯﻣﺎﻥ ﺑﺮﺗﺮ ﺧﻮﺍﻫﺪ ﺑﻮﺩ‪ .‬ﺑﻪ‬

‫ﻋﻨﻮﺍﻥ ﻧﻤﻮﻧﻪ ﻳﮏ ‪ SSL‬ﺑﺎ ‪ ٤٠‬ﻳﺎ ‪ ٥٦‬ﺑﻴﺖ )ﮐﻪ ﻳﮏ ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﺿﻌﻴﻒ ﻣﻲ ﺑﺎﺷﺪ( ﻣﻲ ﺗﻮﺍﻧﺪ ﺗﻮﺳﻂ ﻳﮏ ﻫﮑﺮ ﺑﺎ ﺍﺑﺰﺍﺭ‬ ‫ﮐﺎﻓﻲ ‪ ،‬ﺩﺭ ﻋﺮﺽ ﭼﻨﺪ ﺩﻗﻴﻘﻪ ﺷﮑﺴﺘﻪ ﺷﻮﺩ‪ .‬ﺍﻣﺎ ﻫﻤﻴﻦ ﻫﮑﺮ ﺑﺮﺍﻱ ﻣﻘﺎﺑﻠﻪ ﺑﺎ ‪ ١٢٨ SSL‬ﺑﻴﺘﻲ ‪ ،‬ﻧﻴﺎﺯ ﺑﻪ ‪ ٢٨٨‬ﺑﺎﺭ ﺯﻣﺎﻥ‬ ‫ﺑﻴﺸﺘﺮ ﺩﺍﺭﺩ! ﻭ ﺍﻳﻦ ﺑﺪﻳﻦ ﻣﻌﻨﻲ ﺍﺳﺖ ﮐﻪ ‪ ١٢٨ SSL‬ﺑﻴﺘﻲ ﻧﺴﺒﺖ ﺑﻪ ﺣﺎﻟﺖ ‪ ٤٠‬ﻳﺎ ‪ ٥٦‬ﺑﻴﺘﻲ ﺗﺮﻟﻴﻮﻥ ﺗﺮﻟﻴﻮﻥ ﺑﺎﺭ ﺍﻣﻦ‬ ‫ﺗﺮ ﻭ ﻏﻴﺮ ﻗﺎﺑﻞ ﻧﻔﻮﺫ ﺗﺮ ﺍﺳﺖ!‬ ‫•‬

‫ﻳﮏ ﺑﺤﺚ ﺩﻳﮕﺮ ﺍﻳﻨﺠﺎ ﻣﻄﺮﺡ ﻣﻲ ﺷﻮﺩ ﻭ ﺁﻥ ﺍﻳﻨﮑﻪ ﺍﮔﺮ ﻳﮏ ﻫﮑﺮ ﺩﺭ ﻣﻴﺎﻥ ﺭﺍﻩ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺧﻮﺩ ﺭﺍ ﺟﺎﻳﮕﺰﻳﻦ ﮐﻠﻴﺪ‬ ‫ﻋﻤﻮﻣﻲ ﺳﺮﻭﺭ ﮐﺮﺩ‪ .‬ﺩﺭ ﺍﻳﻦ ﺣﺎﻟﺖ ﻋﻤﻼ ﻫﮑﺮ ﺑﻪ ﺭﺍﺣﺘﻲ ﺑﻪ ﺍﻃﻼﻋﺎﺕ ﮐﺎﺭﺑﺮ ﺩﺳﺘﺮﺳﻲ ﺧﻮﺍﻫﺪ ﺩﺍﺷﺖ‪ .‬ﺩﺭ ﻭﺍﻗﻊ ﺍﻳﻦ‬ ‫ﺩﻗﻴﻘﺎ ﻫﻤﺎﻥ ﺟﺎﻳﻲ ﺍﺳﺖ ﮐﻪ ﻟﺰﻭﻡ ﻭﺟﻮﺩ ‪ CA‬ﻫﺎ ﺩﺭ ﭘﺮﻭﺗﮑﻞ ‪ SSL‬ﻣﻄﺮﺡ ﻣﻲ ﺷﻮﺩ‪.‬ﺩﺭ ﻭﺍﻗﻊ ‪ CA‬ﻫﺎ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ‬ ‫ﺳﺮﻭﺭ ﺭﺍ ﺑﺎ ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ﺧﻮﺩ ﺍﻣﻀﺎ ﻣﻲ ﮐﻨﻨﺪ‪.‬ﻣﺮﻭﺭﮔﺮ ﻫﻢ ‪ CA‬ﻫﺎﻱ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺭﺍ ﻣﻲ ﺷﻨﺎﺳﺪ)ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺁﻧﻬﺎ‬ ‫ﺭﺍ ﺩﺍﺭﺩ(‪.‬ﺍﻳﻦ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ ﺳﺮﻭﺭ ﮐﻪ ﺗﻮﺳﻂ ﮐﻠﻴﺪ ﺧﺼﻮﺻﻲ ‪ CA‬ﺭﻣﺰ ﮔﺬﺍﺭﻱ ﺷﺪﻩ ﺍﺳﺖ ﻫﻤﺎﻥ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻣﻲ‬ ‫ﺑﺎﺷﺪ‪.‬ﺍﺯ ﺁﻧﺠﺎ ﮐﻪ ﺳﺮﻭﺭ ﻣﻲ ﺑﺎﻳﺴﺖ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺧﻮﺩ ﺭﺍ ﺍﺭﺳﺎﻝ ﮐﻨﺪ ‪ ،‬ﺩﺭ ﺳﻤﺖ ﻣﺮﻭﺭﮔﺮ ﺳﻌﻲ ﻣﻲ ﺷﻮﺩ ﮐﻪ ﺗﻮﺳﻂ‬ ‫ﮐﻠﻴﺪ ﻫﺎﻱ ﻋﻤﻮﻣﻲ ‪ CA‬ﻫﺎﻳﻲ ﺭﺍ ﮐﻪ ﻣﻲ ﺷﻨﺎﺳﺪ ‪ ،‬ﺁﻥ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺭﺍ ﺭﻣﺰ ﮔﺸﺎﻳﻲ ﮐﻨﺪ‪.‬ﺍﮔﺮ ﻣﻮﻓﻖ ﺷﺪ ﻭ ﻧﺘﻴﺠﻪ ﺑﺎ ﮐﻠﻴﺪ‬ ‫ﻋﻤﻮﻣﻲ ﺳﺮﻭﺭ ﻳﮑﺴﺎﻥ ﺑﻮﺩ ﺩﺭ ﻭﺍﻗﻊ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﻗﺎﺑﻞ ﺍﻋﺘﻤﺎﺩ ﺍﺳﺖ‪.‬ﺩﺭ ﺍﻳﻦ ﺻﻮﺭﺕ ﺍﻣﮑﺎﻥ ﺍﺳﺘﻔﺎﺩﻩ ﺍﺯ ﮔﻮﺍﻫﻴﻨﺎﻣﻪ ﺩﻳﮕﺮﺍﻥ‬ ‫ﻫﻢ ﻭﺟﻮﺩ ﻧﺪﺍﺭﺩ‪).‬ﺩﻗﻴﻘﺎ ﻫﻤﺎﻥ ﺑﺤﺚ ﺍﻣﻀﺎﻱ ﺩﻳﺠﻴﺘﺎﻟﻲ ﺍﺳﺖ(‬

‫•‬

‫ﺷﺮﮐﺖ ‪ Verisign‬ﻳﮏ ﺩﻭﺭﻩ ﺁﺯﻣﺎﻳﺸﻲ ﻣﺠﺎﻧﻲ ﺑﺮﺍﻱ ﮐﺎﺭ ﺑﺎ ‪ SSL‬ﻣﻲ ﺩﻫﺪ ﮐﻪ ﻣﻲ ﺗﻮﺍﻧﻴﺪ ﺍﺯ ﻃﺮﻳﻖ ﻟﻴﻨﮏ ﺯﻳﺮ ﺍﺯ‬ ‫ﺁﻥ ﺑﻬﺮﻩ ﮔﻴﺮﻳﺪ ‪:‬‬

‫‪http://www.verisign.com/products-services/security-services/ssl/ssl-information‬‬‫‪center/ssl-features-description/index.html‬‬

‫‪ –٩‬ﻭﺍﮊﻩ ﻧﺎﻣﻪ‬ ‫]‪Individual Messages : [١‬‬ ‫]‪Authenticate : [٢‬‬ ‫]‪Handshaking : [٣‬‬ ‫]‪Cipher Preferences : [٤‬‬ ‫]‪Master Key : [٥‬‬ ‫]‪Public Key : [٦‬‬ ‫]‪Challenge : [٧‬‬ ‫]‪Public-Key Certificate : [٨‬‬ ‫]‪Transport Layer Security : [٩‬‬ ‫]‪Wireless TLS : [١٠‬‬ ‫]‪Wireless Application Protocol : [١١‬‬ ‫]‪Certificate : [١٢‬‬ ‫]‪Certificate Authority (CA) : [١٣‬‬ ‫]‪symmetric key : [١٤‬‬

private key : [١٥] certificate trust tree : [١٦] certificate path : [١٧] Sniffing : [١٨]

‫– ﻓﻬﺮﺳﺖ ﻣﻨﺎﺑﻊ‬١٠ ١- http://www.webopedia.com/TERM/S/SSL.html ٢- http://www.rsasecurity.com/rsalabs/node.asp?id=٢٢٩٣ ٣- http://www.webopedia.com/TERM/S/S_HTTP.htm ٤- http://www.tldp.org/HOWTO/SSL-Certificates-HOWTO/x٦٤.html ٥- http://www.verisign.com/products-services/security-services/ssl/sslinformation-center/faq/index.html ‫ ﮐﺘﺎﺏ ﻣﻘﺎﻻﺕ ﭼﻬﺎﺭﻣﻴﻦ ﻫﻤﺎﻳﺶ ﻣﻠﻲ ﺩﺍﻧﺸﺠﻮﻳﻲ‬، ‫ ﻣﺪﻝ ﻫﺎﻱ ﺍﻋﺘﻤﺎﺩ ﺑﺮ ﺑﺴﺘﺮ ﮐﻠﻴﺪ ﻋﻤﻮﻣﻲ‬، ‫‐ ﻗﺪﻳﺮ ﭘﻮﺭ ﺭﺳﺘﻢ‬٦ ١٣٨١ ، ‫ﺍﻧﺠﻤﻦ ﮐﺎﻣﭙﻴﻮﺗﺮ ﺍﻳﺮﺍﻥ‬

Related Documents

Ssl
May 2020 24
Ssl
November 2019 36
Ssl
December 2019 37
Ssl
December 2019 34
Ssl Certificates
June 2020 19
Ssl Proxy
December 2019 16