
Developing Security-Enabled Applications • Chapter 11 481
3. Now a cryptographic cipher must be created for the key pair
and the key length must be specified.The longer the key, the
stronger the security the key pair represents.After key length is
defined (see Figure 11.22), click Next to continue.
A hashing algorithm for authentication must be selected
next.The default algorithm is SHA1. Click Next to accept the
default and continue.
4. The certificate extensions screen allows you to select the type of
certificates you can issue and sign with your CA.We select the
types that best suit our purpose, as shown in Figure 11.23. Click
Next to continue.
5. You ar ...