@@ -91,8 +91,8 @@ FOO Corporation in Detroit, Michigan might have a digital certificate with a
91
91
` SUBJECT ` attribute of `C=US, ST=Michigan, L=Detroit, O=FOO Corporation, OU=Accounting,
92
92
CN=John Doe /UID=123456`. John's certificate is similar to his government identity
93
93
card -- it provides information about John which he can use to prove key facts about him.
94
- There are many other attributes in an X.509 certificate, but concentrate on just these
95
- for now.
94
+ There are many other attributes in an X.509 certificate, but let's concentrate
95
+ on just these for now.
96
96
97
97
![ DigitalCertificate] ( ./identity.diagram.8.png )
98
98
@@ -114,9 +114,10 @@ certificate as a digital identity card that is impossible to change.
114
114
115
115
## Authentication \& Public keys and Private Keys
116
116
117
- Authentication and message integrity are important concepts of secure communication,
118
- requiring tha parties who exchange messages can be ensured of the identity that created
119
- a specific message, as well as the message was not modified during its transmission.
117
+ Authentication and message integrity are important concepts of secure
118
+ communication. Authentication requires that parties who exchange messages
119
+ can be assured of the identity that created a specific message. Integrity
120
+ requires that the message was not modified during its transmission.
120
121
For example, you might want to be sure you're communicating with the real John
121
122
Doe than an impersonator. Or if John has sent you a message, you might want to be sure
122
123
that it hasn't been tampered with by anyone else during transmission.
@@ -129,8 +130,8 @@ Technically speaking, digital signature mechanisms require require for each part
129
130
hold two cryptographically connected keys: a public key that is made widely available,
130
131
and acts as authentication anchor, and a private key that is used to produce
131
132
** digital signatures** on messages. Recipients of digitally signed messages can verify
132
- their origin and integrity by checking that the attached signature matches the public key
133
- of the expected sender.
133
+ the origin and integrity of a received message by checking that the
134
+ attached signature is valid under the public key of the expected sender.
134
135
135
136
** The unique relationship between a private key and the respective public key is the
136
137
cryptographic magic that makes secure communications possible** . The unique
@@ -140,7 +141,7 @@ only on the same message.
140
141
141
142
![ AuthenticationKeys] ( ./identity.diagram.9.png )
142
143
143
- In th example above, to authenticate his message Joe uses his private key to produce a
144
+ In the example above, to authenticate his message Joe uses his private key to produce a
144
145
signature on the message, which he then attaches to the message. The signature
145
146
can be verified by anyone who sees the signed message, using John's public key.
146
147
@@ -151,7 +152,7 @@ can be verified by anyone who sees the signed message, using John's public key.
151
152
As you've seen, an actor or a node is able to participate in the blockchain network,
152
153
via the means of a ** digital identity** issued for it by an authority trusted by the
153
154
system. In the most common case, digital identities (or simply ** identities** ) have
154
- the form of cryptographically validated digital certificatesi that comply with X.509
155
+ the form of cryptographically validated digital certificates that comply with X.509
155
156
standard, and are issued by a Certificate Authority (CA).
156
157
157
158
CAs are a common part of internet security protocols, and you've probably heard of
@@ -178,7 +179,7 @@ verify them by checking that the certificate could only have been generated
178
179
by the holder of the corresponding private key (the CA).
179
180
180
181
In the Blockchain setting, every actor who wishes to interact with the network
181
- needs an identity. In this setting, you might say that ** one or more CAs** can be uded
182
+ needs an identity. In this setting, you might say that ** one or more CAs** can be used
182
183
to ** define the members of an organization's from a
183
184
digital perspective** . It's the CA that provides the basis for an
184
185
organization's actors to have a verifiable digital identity.
@@ -195,7 +196,7 @@ that is issued by any CA in the chain. This ability to track back to the Root
195
196
CA not only allows the function of CAs to scale while still providing security
196
197
-- allowing organizations that consume certificates to use Intermediate CAs with
197
198
confidence -- it limits the exposure of the Root CA, which, if compromised, would
198
- destroy the entire chain of trust. If an Intermediate CA is compromised, on the
199
+ endanger the entire chain of trust. If an Intermediate CA is compromised, on the
199
200
other hand, there is a much smaller exposure.
200
201
201
202
![ ChainOfTrust] ( ./identity.diagram.1.png )
@@ -214,7 +215,7 @@ it really does depend on the needs of the network.
214
215
215
216
It's because CAs are so important that Fabric provides a built-in CA component to
216
217
allow you to create CAs in the blockchain networks you form. This component -- known
217
- as ** fabric-ca** is private root CA provider capable of managing digital identities of
218
+ as ** fabric-ca** is a private root CA provider capable of managing digital identities of
218
219
Fabric participants that have the form of X.509 certificates.
219
220
Because Fabric-CA is a custom CA targetting the Root CA needs of Fabric,
220
221
it is inherently not capable of providing SSL certificates for general/automatic use
@@ -229,11 +230,11 @@ If you're interested, you can read a lot more about fabric-ca
229
230
## Certificate Revocation Lists
230
231
231
232
A Certificate Revocation List (CRL) is easy to understand -- it's just a list of
232
- certificates that a CA knows to be revoked for one reason or another. If you recall
233
+ references to certificates that a CA knows to be revoked for one reason or another. If you recall
233
234
the store scenario, a CRL would be like a list of stolen credit cards.
234
235
235
236
When a third party wants to verify another party's identity, it first checks the
236
- issuing CA's CRL to make sure that the certificate has not been declared invalid .
237
+ issuing CA's CRL to make sure that the certificate has not been revoked .
237
238
A verifier doesn't have to check the CRL, but if they don't they run the risk of
238
239
accepting a compromised identity.
239
240
0 commit comments