Configuring Settings for Key Pairs and Digital Certificates

In order to encrypt communication with a remote device, an encryption key must be sent and received over an unsecured network beforehand. This problem is solved by public-key cryptography. Public-key cryptography ensures secure communication by protecting important and valuable information from attacks, such as sniffing, spoofing, and tampering of data as it flows over a network.
Key Pair
 
A key pair consists of a public key and a secret key, both of which are required for encrypting or decrypting data. Because data that has been encrypted with one of the key pair cannot be returned to its original data form without the other, public-key cryptography ensures secure communication of data over the network. Up to five key pairs can be registered (Using CA-issued Key Pairs and Digital Certificates). For TLS encrypted communication, a key pair can be generated for the machine (Generating Key Pairs).
CA Certificate
 
Digital certificates including CA certificates are similar to other forms of identification, such as driver's licenses. A digital certificate contains a digital signature, which enables the machine to detect any spoofing or tampering of data. It is extremely difficult for third parties to abuse digital certificates. A digital certificate that contains a public key of a certification authority (CA) is referred to as a CA certificate. CA certificates are used for verifying the device the machine is communicating with for features such as printing with IEEE 802.1X authentication. Up to 10 CA certificates can be registered, including the five certificates that are preinstalled in the machine (Using CA-issued Key Pairs and Digital Certificates).
Device Signature Key and Certificate
 
A device signature key and certificate are digital certification to show that a document was scanned from the machine. The machine generates this certification by itself. The certification can be appended when a scanned original is converted to PDF format (Generating a Device Signature Key). It cannot be used with TLS encrypted communication or IPsec digital signaturing.
An optional Send PDF Security Feature Set is required.

Key and Certificate Requirements

The certificate contained in a key pair generated with the machine conforms to X.509v3. If you install a key pair or a CA certificate from a computer, make sure that they meet the following requirements:
Format
Key pair: PKCS#12*1
CA certificate: X.509v1 or X.509v3, DER (encoded binary)
File extension
Key pair: ".p12" or ".pfx"
CA certificate: ".cer"
Public key algorithm
(and key length)
RSA (512 bits, 1024 bits, 2048 bits, or 4096 bits)
Certificate signature algorithm
SHA1-RSA, SHA256-RSA, SHA384-RSA*2, SHA1-DSA, SHA512-RSA*2, MD5-RSA, or MD2-RSA
Certificate thumbprint algorithm
SHA1
*1 Requirements for the certificate contained in a key pair are pursuant to CA certificates.
*2 SHA384-RSA and SHA512-RSA are available only when the RSA key length is 1024 bits or more.
The machine does not support use of a certificate revocation list (CRL).
14E7-08Y