SlideShare a Scribd company logo
Digital Certificates
Introduction
What is cryptography?
The art of secret writing
• Cryptosystems
• keys
Problem
Problem: How does Alice know that the public key
she received is really Bob’s public key?
Digital Certificate
• Electronic counterparts to driver licenses, passports
• Prove your identity or right to access information or
services online
• Bind an identity to a pair of electronic keys
• Provide a more complete security solution
• Role of Certification Authority (CA)
Digital Certificates
• Structure of Digital Certificate
– Owner's public key
– Owner's name
– Expiration date of the public key
– Name of the issuer (the CA that issued the Digital
Certificate)
– Serial number of the Digital Certificate
– Digital signature of the issuer
• Defined by CCITT X.509 international
standard
Digital Certificates
• Provide support for public key cryptography (PKC)
• Digital certificates contain the public key of the entity
• It rely on PKC for their own authentication
• Used on handheld devices, mobile phones, on
portable cards, smart cards
public key infrastructure (PKI)
A public key infrastructure (PKI) consists of the
components necessary to securely distribute public
keys
It consists of:
– Certificates
– Certificate authorities (CAs)
– A repository for retrieving certificates
– A method for revoking certificates
– A method of evaluating a chain of certificates
Public Key Infrastructures (PKIs)
• To use public key methods, an organization
must establish a comprehensive Public Key
Infrastructure (PKI)
– A PKI automates most aspects of using public key
encryption and authentication
– Uses a PKI Server
Public Key Infrastructures (PKIs)
• PKI Server Creates Public Key-Private Key Pairs
– Distributes private keys to applicants securely
– Often, private keys are embedded in delivered
software
PKI
Server
Private Key
Public Key Infrastructures (PKIs)
• PKI Server Provides Certificate Revocation
list (CRL) Checks
– Distributes digital certificates to verifiers
– Checks certificate revocation list before sending
digital certificates
PKI
Server
Digital Certificate
Public Key Infrastructures (PKIs)
• CRL Checks
– If applicant gives verifier a digital certificate,
– The verifier must check the certificate revocation
list
PKI
Server
OK?
OK or Revoked
CRL
Generating the digital certificate
Digital Certificate : Example
Use of Digital Certificates
• Electronic transactions
– E-mail
– Electronic commerce
– Groupware
– Electronic funds transfers
• Netscape's Enterprise Server
Message Encryption
Message Decryption
Use of Digital Certificates
Need of Digital Certificates
• Proper Privacy and Security
• Trust
• Special safeguards
• Assuring the identity of all parties
• To provide legitimate content
Digital Certificate Services
• Services
– Issuing
– Revocation
– Status services
• Types of Digital Certificates
– Server
– Developer (For softwares)
– personal
Digital Signature
• Function as hand written signature
electronically
• Non repudiated
• Enable "authentication" of digital messages
DC used for Digital signature and
Encryption
DC used for Digital signature and
Decryption
References
• www.ifour-consultancy.com

More Related Content

PDF
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
PPTX
Digital certificates
Buddhika Karunanayaka
 
PPT
Digital certificates
Sheetal Verma
 
PPTX
public key infrastructure
vimal kumar
 
PPTX
Digital signature
Praseela R
 
PPT
Digital Signature
nayakslideshare
 
PPT
Ssl (Secure Sockets Layer)
Asad Ali
 
PPT
Presentation on digital signatures & digital certificates
Vivaka Nand
 
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Digital certificates
Buddhika Karunanayaka
 
Digital certificates
Sheetal Verma
 
public key infrastructure
vimal kumar
 
Digital signature
Praseela R
 
Digital Signature
nayakslideshare
 
Ssl (Secure Sockets Layer)
Asad Ali
 
Presentation on digital signatures & digital certificates
Vivaka Nand
 

What's hot (20)

PPTX
Digital signature & certificate
NetGains Technologies Pvt. Ltd.
 
PPTX
Digital certificates
Simmi Kamra
 
PPT
Digital Signature
saurav5884
 
PPT
Digital signature
AJAL A J
 
PPT
Network security and protocols
Online
 
PPT
Digital Certificate
Sumant Diwakar
 
PPTX
Introduction to Public Key Infrastructure
Theo Gravity
 
PPTX
Public key infrastructure
Aditya Nama
 
PPT
Secure electronic transactions (SET)
Omar Ghazi
 
PDF
Web Security Threats and Solutions
Ivo Andreev
 
PPT
DIGITAL SIGNATURE
ravijain90
 
PPT
Digital signature Brief Introduction
Ganesh Kothe
 
PDF
Kerberos
Sparkbit
 
PPTX
Kerberos : An Authentication Application
Vidulatiwari
 
PPT
Digital Signature
Mohamed Talaat
 
PPTX
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
PPT
Cryptography
amiable_indian
 
PPTX
Digital signatures
ReachLocal Services India
 
PPTX
Kerberos
Sudeep Shouche
 
PDF
Blockchain Security and Privacy
Anil John
 
Digital signature & certificate
NetGains Technologies Pvt. Ltd.
 
Digital certificates
Simmi Kamra
 
Digital Signature
saurav5884
 
Digital signature
AJAL A J
 
Network security and protocols
Online
 
Digital Certificate
Sumant Diwakar
 
Introduction to Public Key Infrastructure
Theo Gravity
 
Public key infrastructure
Aditya Nama
 
Secure electronic transactions (SET)
Omar Ghazi
 
Web Security Threats and Solutions
Ivo Andreev
 
DIGITAL SIGNATURE
ravijain90
 
Digital signature Brief Introduction
Ganesh Kothe
 
Kerberos
Sparkbit
 
Kerberos : An Authentication Application
Vidulatiwari
 
Digital Signature
Mohamed Talaat
 
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Cryptography
amiable_indian
 
Digital signatures
ReachLocal Services India
 
Kerberos
Sudeep Shouche
 
Blockchain Security and Privacy
Anil John
 
Ad

Viewers also liked (8)

PPTX
Mobile Management
Carahsoft
 
PPTX
History of Web Technology
Shuvo Malakar
 
PDF
Meeting Mobile and BYOD Security Challenges
Symantec
 
PPTX
Digital Certificates and Secure Web Access
bluntm64
 
PPTX
Why you need to secure mobile apps - now
Symantec
 
PPSX
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Tamim Khan
 
PDF
Enterprise Application Integration Technologies
Peter R. Egli
 
PPT
Enterprise application integration
Goa App
 
Mobile Management
Carahsoft
 
History of Web Technology
Shuvo Malakar
 
Meeting Mobile and BYOD Security Challenges
Symantec
 
Digital Certificates and Secure Web Access
bluntm64
 
Why you need to secure mobile apps - now
Symantec
 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Tamim Khan
 
Enterprise Application Integration Technologies
Peter R. Egli
 
Enterprise application integration
Goa App
 
Ad

Similar to Digital certificates and information security (20)

PPT
PKI and Applications
Svetlin Nakov
 
PPT
Public Key Infrastructure and Application_Applications.ppt
lanhuongvernon
 
PPT
PKI_Applications digital certificate.ppt
ubaidullah75790
 
PPT
NS Unit 3 AAR.ppt
Vishalkumar605125
 
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
PDF
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
PPT
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
PPT
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
PPT
Session 10 Tp 10
githe26200
 
PDF
Digital certificate management v1 (Draft)
Avirot Mitamura
 
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
PPTX
Digital signature & eSign overview
Rishi Pathak
 
PPT
Pki the key to securing sensitive communications
Nicholas Davis
 
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
PDF
Unit 3_Digital Certificate_Intro_Types.pdf
KanchanPatil34
 
PPTX
Digital signature & PKI Infrastructure
Shubham Sharma
 
PPT
E collaborationscottrea
Collaborative Health Consortium
 
PDF
PKI - The Backbone of Digital Signatures - DrySign by Exela
Drysign By Exela
 
PPTX
Digital certificates
Deevena Dayaal
 
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 
PKI and Applications
Svetlin Nakov
 
Public Key Infrastructure and Application_Applications.ppt
lanhuongvernon
 
PKI_Applications digital certificate.ppt
ubaidullah75790
 
NS Unit 3 AAR.ppt
Vishalkumar605125
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
Session 10 Tp 10
githe26200
 
Digital certificate management v1 (Draft)
Avirot Mitamura
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
Digital signature & eSign overview
Rishi Pathak
 
Pki the key to securing sensitive communications
Nicholas Davis
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
Unit 3_Digital Certificate_Intro_Types.pdf
KanchanPatil34
 
Digital signature & PKI Infrastructure
Shubham Sharma
 
E collaborationscottrea
Collaborative Health Consortium
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
Drysign By Exela
 
Digital certificates
Deevena Dayaal
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Pace IT at Edmonds Community College
 

Recently uploaded (20)

PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Software Development Methodologies in 2025
KodekX
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
The Future of Artificial Intelligence (AI)
Mukul
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 

Digital certificates and information security

  • 2. Introduction What is cryptography? The art of secret writing • Cryptosystems • keys
  • 3. Problem Problem: How does Alice know that the public key she received is really Bob’s public key?
  • 4. Digital Certificate • Electronic counterparts to driver licenses, passports • Prove your identity or right to access information or services online • Bind an identity to a pair of electronic keys • Provide a more complete security solution • Role of Certification Authority (CA)
  • 5. Digital Certificates • Structure of Digital Certificate – Owner's public key – Owner's name – Expiration date of the public key – Name of the issuer (the CA that issued the Digital Certificate) – Serial number of the Digital Certificate – Digital signature of the issuer • Defined by CCITT X.509 international standard
  • 6. Digital Certificates • Provide support for public key cryptography (PKC) • Digital certificates contain the public key of the entity • It rely on PKC for their own authentication • Used on handheld devices, mobile phones, on portable cards, smart cards
  • 7. public key infrastructure (PKI) A public key infrastructure (PKI) consists of the components necessary to securely distribute public keys It consists of: – Certificates – Certificate authorities (CAs) – A repository for retrieving certificates – A method for revoking certificates – A method of evaluating a chain of certificates
  • 8. Public Key Infrastructures (PKIs) • To use public key methods, an organization must establish a comprehensive Public Key Infrastructure (PKI) – A PKI automates most aspects of using public key encryption and authentication – Uses a PKI Server
  • 9. Public Key Infrastructures (PKIs) • PKI Server Creates Public Key-Private Key Pairs – Distributes private keys to applicants securely – Often, private keys are embedded in delivered software PKI Server Private Key
  • 10. Public Key Infrastructures (PKIs) • PKI Server Provides Certificate Revocation list (CRL) Checks – Distributes digital certificates to verifiers – Checks certificate revocation list before sending digital certificates PKI Server Digital Certificate
  • 11. Public Key Infrastructures (PKIs) • CRL Checks – If applicant gives verifier a digital certificate, – The verifier must check the certificate revocation list PKI Server OK? OK or Revoked CRL
  • 12. Generating the digital certificate
  • 14. Use of Digital Certificates • Electronic transactions – E-mail – Electronic commerce – Groupware – Electronic funds transfers • Netscape's Enterprise Server
  • 15. Message Encryption Message Decryption Use of Digital Certificates
  • 16. Need of Digital Certificates • Proper Privacy and Security • Trust • Special safeguards • Assuring the identity of all parties • To provide legitimate content
  • 17. Digital Certificate Services • Services – Issuing – Revocation – Status services • Types of Digital Certificates – Server – Developer (For softwares) – personal
  • 18. Digital Signature • Function as hand written signature electronically • Non repudiated • Enable "authentication" of digital messages
  • 19. DC used for Digital signature and Encryption
  • 20. DC used for Digital signature and Decryption