DVS Clipster Specifications Page 39

  • Download
  • Add to my manuals
  • Print
  • Page
    / 49
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 38
6-7
Miscellaneous
6.5.2 What’s a Certificate
A certificate is a file that usually contains a key. Additionally it includes
a digital signature to ensure the validity of the key/certificate. With this
the purpose of a certificate is, on the one hand, to provide you with a
key and, on the other, to confirm that this certificate and key belong to
a certain identity (e.g. a person, institute or company).
Ideally the signature comes from a certificate authority (CA) employed
with the task to check identities before issuing certificates that refer to
this identity. However, the most commonly used certificates are those
that users make for themselves (self-signed certificates). Also common
are certificates that users make for others so that these can certify va-
lidities on behalf of the user (certificate chain, see section “What’s a
Certificate Chain”).
In the DCI Mastering a certificate normally contains a public key
(*.cer or *.pem files). A private key is usually provided in a personal
information exchange file (*.pfx) which is typically encrypted and re-
quires a password to be opened. Mostly this file will contain the public-
key certificate (or more than one if a certificate chain is involved) for au-
thentication as well.
6.5.3 The Key Players of the DCI Mastering
Detailed in the following you can find the key pairs that are used during
a DCI Mastering.
AES Key
The AES key is a symmetric key used to en- and decrypt the content of
the DCP (track files). For each track file an individual AES key is gener-
ated. This key will be encrypted with the Encryption Key on CLIPSTER
(see below) and written to the KDM file.
The AES key is generated randomly and automatically by CLIPSTER.
asymmetric Algorithms that require two different keys, one for
encryption and one for decryption, are called asym-
metric key algorithms. The concept behind them is
that it is almost impossible to compute one key from
the other. With this you can make one key public
(the public key) while keeping the other in secret (the
private key), thus providing others with the means,
for example, to send encrypted pieces of information
to the private key holder that only he can decode.
Page view 38
1 2 ... 34 35 36 37 38 39 40 41 42 43 44 ... 48 49

Comments to this Manuals

No comments