Overview
Intel's reference implementation of CDSA V1.2 includes four sample
applications. These applications work with the Intel reference implementation of CSSM.
Digital certificates are electronic equivalents
of the many cards we use daily for identification and authorization. Examples include
driver's licenses, credit cards, library cards, and Medicare cards, among others. The
Certificate Manager is a sample application that allows end-users to view existing digital
certificates and create new digital certificates. The certificate manager displays
standard name and address fields present in most types of certificates, as well as
graphical data such as a photo of the certificate owner or a digitized cursive signature
of that owner. Certificates are not always independent credentials. Some certificates
obtain their authority from a related certificate. For example, the Big East Federal Bank
may accept your personal First Western Bank certificate because the First Western Bank
certificate is chained to your personal certificate. The Certificate Manager allows users
to traverse, view and build certificate chains.
The Certificate Manager uses security services
provided through the CSSM API. CSSM and a set of add-in security modules must be resident
on the system for use by the Certificate Manager application. CSSM
and an Intel Cryptographic Services Module are available as part
of the V1.2 release.
The Certificate Manager application and CSSM
execute in the Microsoft Windows* 95 and Windows NT* 4.0 environments. The Windows 3.1 and
Windows NT 3.51 environments are not supported.
The CSSM software expires, making the Certificate
Manager non-functional on September 30, 1998.
One of the cornerstones of the CDSA framework is
the use of digital certificates. The Certificate Viewer is an application that lets users
view and verify Common Security Services Manager (CSSM) digital certificates. A digital
certificate is a credential in cyberspace that is issued by a trusted third party, called
a certificate authority (CA). This application allows a user to view certificates that are
stored in a CSSM certificate database, check the electronic signature on the certificate,
and view the 'thumbprint' (also known as the digest or hash) of the certificate.
The Certificate Viewer uses security services provided through the CSSM API. CSSM and a
set of add-in security modules must be resident on the system for use by the Certificate
Viewer application. CSSM and an Intel
Cryptographic Services Module are available as part of the V1.2 release.
The Certificate Viewer application and CSSM
execute in the Microsoft Windows* 95 and Windows NT* 4.0 environments. The Windows 3.1 and
Windows NT 3.51 environments are not supported.
The CSSM reference implementation software expires, making the Certificate
Viewer non-functional on September 30, 1998.
KeyKeeper is a sample program that illustrates
how to use CSSM to do symmetric encryption and decryption. KeyKeeper allows you to protect
and remember all of your passwords, giving you access with a single master password. You
can think of KeyKeeper as a locked box with a list of secrets (your passwords and other
information). A single key, the master password, allows access to all the secrets in the
box.
The KeyKeeper application uses security services
provided through the CSSM API. CSSM and a set of add-in security modules must be resident
on the system for use by the KeyKeeper application. CSSM and an Intel Cryptographic Services Module are available as part of the
V1.2 release.
The KeyKeeper application and CSSM execute in the
Microsoft Windows* 95 and Windows NT* 4.0 environments. The Windows 3.1 and Windows NT
3.51 environments are not supported.
The CSSM reference implementation software expires, making the KeyKeeper
application non-functional on September 30, 1998.
Using shrink wrap packaging
to protect goods and the consumers of those goods has become a common practice in our
daily lives. Examples range from shrink-wrapped pharmaceutical products to shrink-wrapped
boxes containing computer software products. The wrapping cant protect the wrapped
contents from external interventions, but it does protect the consumer by providing a
secure and reliable mechanism to:
- Determine the integrity of the wrapped contents
- Alert the consumer when the wrapping may have been
tampered with
If the shrink wrap is intact, the consumer is
confident that the pharmaceutical or the computer software has not been altered since it
was manufactured and wrapped. Shrink wrapping also protects the reputation of a company
selling reliable products.
The Electronic Shrink Wrapper is a sample
security application, implemented using the Common Security Services Manager Integrity
Services Library (CSSM ISL). The Electronic Shrink Wrapper application performs
digital shrink wrapping for bundles of data. A digital shrink wrap is a logical wrapping
of a bundle of data objects. Because the wrapping is logical, the data objects can be
verified and accessed repeatedly without destroying the assurance benefits of the wrap.
Verifying the integrity of the shrink wrap assures the user that the contents of each data
object in the bundle has not changed and that the bundle contains exactly the original set
of data objects, no more and no less. Electronic shrink wrapping provides an additional
benefit. You can reliably verify the identity of the individual or organization who
wrapped the data objects.
The ESW application uses security services
provided through the CSSM API. CSSM and a set of add-in security modules must be resident
on the system for use by the ESW application. CSSM and an Intel Cryptographic Services Module are available as part of the
V1.2 release.
The ESW application and CSSM execute in the
Microsoft Windows* 95 and Windows NT* 4.0 environments. The Windows 3.1 and Windows NT
3.51 environments are not supported.
The CSSM reference implementation software expires, making the ESW
application non-functional on September 30, 1998.
Please send comments and questions to cdsa@ibeam.intel.com
* Legal Information © 1998 Intel Corporation
|