SlideShare a Scribd company logo
1 of 34
Digital CertificatesDigital Certificates
What are Digital Certificates?What are Digital Certificates?
A digital certificate (DC) is a digital fileA digital certificate (DC) is a digital file
that certifies the identity of an individual orthat certifies the identity of an individual or
institution, or even a router seekinginstitution, or even a router seeking
access to computer- based information. Itaccess to computer- based information. It
is issued by a Certification Authority (is issued by a Certification Authority (CACA),),
and serves the same purpose as a driver’sand serves the same purpose as a driver’s
license or a passport.license or a passport.
What are CertificationWhat are Certification
Authorities?Authorities?
Certification Authorities are the digital world’sCertification Authorities are the digital world’s
equivalent to passport offices. They issue digitalequivalent to passport offices. They issue digital
certificates and validate holders’ identity andcertificates and validate holders’ identity and
authority.authority.
They embed an individual or institution’s publicThey embed an individual or institution’s public
key along with other identifying information intokey along with other identifying information into
each digital certificate and theneach digital certificate and then
cryptographically sign it as a tamper-proof sealcryptographically sign it as a tamper-proof seal
verifying the integrity of the data within it, andverifying the integrity of the data within it, and
validating its use.validating its use.
What is the Process of obtaining aWhat is the Process of obtaining a
certificate?certificate?
1.Subscriber (sender) generates a publicprivate key pair. Applies to
CA for digital certificate with the public key.
2.CA verifies subscriber's identity and issues digital certificate
containing the public key.
3.CA publishes certificate to public, on-line repository.
4.Subscriber signs message with private key and sends message to
second party.
5.Receiving party verifies digital signature with sender's public key
and requests verification of sender's digital certificate from CA's
public repository.
6.Repository reports status of subscriber's certificate.
Bob’s
public
key
Bob’s
identifying
information
CA
private
key
KB
+
certificate for
Bob’s public key,
signed by CA
Digital
signature
(encrypt)
KB
+
KCA
-
Bob’s
public
key
Bob’s
identifying
information
CA
private
key
KB
+
certificate for
Bob’s public key,
signed by CA
Digital
signature
(encrypt)
KB
+
KCA
What is the Process in obtaining aWhat is the Process in obtaining a
certificate?certificate?
Types of Digital CertificatesTypes of Digital Certificates
 There are four main types of digitalThere are four main types of digital
certificates :-certificates :-

Server CertificatesServer Certificates

Personal CertificatesPersonal Certificates

Organization CertificatesOrganization Certificates

Developer CertificatesDeveloper Certificates
Server CertificatesServer Certificates
 Allows visitors to exchange personalAllows visitors to exchange personal
information such as credit card numbers,information such as credit card numbers,
free from the threat of interception orfree from the threat of interception or
tampering.tampering.
 Server Certificates are a must for buildingServer Certificates are a must for building
and designing e-commerce sites asand designing e-commerce sites as
confidential information is shared betweenconfidential information is shared between
clients, customers and vendors.clients, customers and vendors.
Personal CertificatesPersonal Certificates
 Personal Certificates allow one to authenticate aPersonal Certificates allow one to authenticate a
visitor’s identity and restrict access to specifiedvisitor’s identity and restrict access to specified
content to particular visitors.content to particular visitors.
 Personal Certificates are perfect for business toPersonal Certificates are perfect for business to
business communications such as offeringbusiness communications such as offering
suppliers and partners controlled access tosuppliers and partners controlled access to
special web sites for updating productspecial web sites for updating product
availability, shipping dates and inventoryavailability, shipping dates and inventory
management.management.
Organization & DeveloperOrganization & Developer
CertificatesCertificates
 Organization Certificates are used byOrganization Certificates are used by
corporate entities to identify employees forcorporate entities to identify employees for
secure e-mail and web-based transaction.secure e-mail and web-based transaction.
 Developer Certificates prove authorshipDeveloper Certificates prove authorship
and retain integrity of distributed softwareand retain integrity of distributed software
programs e.g. installing a software on aprograms e.g. installing a software on a
computer system in most instancescomputer system in most instances
requires what is called a “serial key”requires what is called a “serial key”
What Does a Digital CertificateWhat Does a Digital Certificate
Contain?Contain?
It contains yourIt contains your namename, a, a serial numberserial number,,
expiration dateexpiration date,, a copy of the certificate-a copy of the certificate-
holder'sholder's public keypublic key (used for encrypting(used for encrypting
messages andmessages and digital signaturedigital signaturess), and), and thethe
digital signature of the certificate-issuingdigital signature of the certificate-issuing
authorityauthority so that a recipient can verify thatso that a recipient can verify that
the certificate is real. Some digitalthe certificate is real. Some digital
certificates conform to the X.509 standard.certificates conform to the X.509 standard.
Example of a Certificate:Example of a Certificate:
 Serial number (unique to issuer)Serial number (unique to issuer)
 info about certificate owner, including algorithminfo about certificate owner, including algorithm
and key value itself (not shown)and key value itself (not shown)
 info about certificate issuerinfo about certificate issuer
 valid datesvalid dates
 digital signature by issuerdigital signature by issuer
Why are they Used?Why are they Used?
There are four(4) main uses:There are four(4) main uses:
1.1. Proving the Identity of the sender of a transactionProving the Identity of the sender of a transaction
2.2. Non Repudiation –Non Repudiation – the owner of the certificate cannot denythe owner of the certificate cannot deny
partaking in the transactionpartaking in the transaction
3.3. Encryption and checking the integrity of data -Encryption and checking the integrity of data - provideprovide
the receiver with the means to encode a reply.the receiver with the means to encode a reply.
4.4. Single Sign-On -Single Sign-On - It can be used to validate a user and logIt can be used to validate a user and log
them into various computer systems without having to use athem into various computer systems without having to use a
different password for each systemdifferent password for each system
Public & Private KeysPublic & Private Keys
Public and Private Key pairs comprise of twoPublic and Private Key pairs comprise of two
uniquely related cryptographic keys.uniquely related cryptographic keys.
Public key is made accessible to everyone,Public key is made accessible to everyone,
whereas Private key remains confidential to itswhereas Private key remains confidential to its
respective owner.respective owner.
Since both keys are mathematically related onlySince both keys are mathematically related only
the corresponding private key can decrypt theirthe corresponding private key can decrypt their
corresponding public key.corresponding public key.
How do You Obtain An Individual’sHow do You Obtain An Individual’s
Public Key?Public Key?

When Alice wants Bob’s public key:When Alice wants Bob’s public key:
• Alice gets Bob’s certificate (from Bob or elsewhere).Alice gets Bob’s certificate (from Bob or elsewhere).
• apply CA’s public key to Bob’s certificate, get Bob’s publicapply CA’s public key to Bob’s certificate, get Bob’s public
keykey
KB
+
digital
signature
(decrypt)
KB
+
CA
public
key
KCA
Bob’s
public
key
Where are Digital CertificatesWhere are Digital Certificates
Used?Used?
 In a number of Internet applications
that include:
 1.Secure Socket Layer (SSL) developed
by Netscape Communications Corporation
 2. Secure Multipurpose Internet Mail
Extensions (S/MIME) Standard for
securing email and electronic data
interchange (EDI).
 3. Secure Electronic Transactions (SET)
protocol for securing electronic payments
 4. Internet Protocol Secure Standard
(IPSec) for authenticating networking
devices
Where are Digital CertificatesWhere are Digital Certificates
Used?Used?
How Digital Certificates are UsedHow Digital Certificates are Used
for Message Encryptionfor Message Encryption
Why do I need a Digital Certificate?Why do I need a Digital Certificate?
 Virtual malls, electronic banking and otherVirtual malls, electronic banking and other
electronic services are a commonplaceelectronic services are a commonplace
offering service from the luxury of one’soffering service from the luxury of one’s
home. One’s concern about privacy andhome. One’s concern about privacy and
security may prevent you from takingsecurity may prevent you from taking
advantage of the luxury; this is whereadvantage of the luxury; this is where
digital certificate comes in.digital certificate comes in.
Why do I need a Digital Certificate?Why do I need a Digital Certificate?
 Encryption alone is not enough as itEncryption alone is not enough as it
provides no proof of the identity of theprovides no proof of the identity of the
sender of the encrypted information. Usedsender of the encrypted information. Used
in conjunction with Encryption, Digitalin conjunction with Encryption, Digital
Certificates provides a more completeCertificates provides a more complete
security solution, assuring the identity ofsecurity solution, assuring the identity of
all the parties involved in a transaction.all the parties involved in a transaction.
How do I view Digital CertificatesHow do I view Digital Certificates
on my PC?on my PC?
 For MS Explorer Users:-For MS Explorer Users:-

Open your MS Internet ExplorerOpen your MS Internet Explorer

Click on the Tools MenuClick on the Tools Menu

From the drop down list, select InternetFrom the drop down list, select Internet
optionsoptions

Click the Content tabClick the Content tab

Click the certificates buttonClick the certificates button
Example of an MS ExplorerExample of an MS Explorer
Certificate.Certificate.
How do I view Digital CertificatesHow do I view Digital Certificates
on my PC?on my PC?
 For Netscape users:-For Netscape users:-

Open your Netscape CommunicatorOpen your Netscape Communicator

Click on the Communicator MenuClick on the Communicator Menu

From the drop down list select the Tools andFrom the drop down list select the Tools and
then Security infothen Security info

Click on the Certificates link to view and learnClick on the Certificates link to view and learn
more about each certificate type stored bymore about each certificate type stored by
NetscapeNetscape
Example of a Netscape CertificateExample of a Netscape Certificate
Advantages of Digital CertificatesAdvantages of Digital Certificates
 Decrease the number of passwords a user
has to remember to gain access to
different network domains.
 They create an electronic audit trail that
allows companies to track down who
executed a transaction or accessed an
area.
Do Digital Certificates HaveDo Digital Certificates Have
Vulnerabilities?Vulnerabilities?
 One problem with a digital certificate isOne problem with a digital certificate is
where it resides once it is obtained.where it resides once it is obtained.
 The owner's certificate sits on hisThe owner's certificate sits on his
computer, and it is the sole responsibilitycomputer, and it is the sole responsibility
of the owner to protect it.of the owner to protect it.
 If the owner walks away from hisIf the owner walks away from his
computer, others can gain access to it andcomputer, others can gain access to it and
use his digital certificate to executeuse his digital certificate to execute
unauthorized business.unauthorized business.
 The best way to address the vulnerabilitiesThe best way to address the vulnerabilities
of digital certificates is by combining themof digital certificates is by combining them
with biometric technology, as that confirmswith biometric technology, as that confirms
the actual identity of the sender, ratherthe actual identity of the sender, rather
than the computer.than the computer.
Do Digital Certificates HaveDo Digital Certificates Have
Vulnerabilities?Vulnerabilities?
GlossaryGlossary
PKI – Public Key Infrastructure (PKI) provides aPKI – Public Key Infrastructure (PKI) provides a
framework for addressing the previouslyframework for addressing the previously
illustrated fundamentals of security listed above.illustrated fundamentals of security listed above.
Encryption- Encryption is converting of data intoEncryption- Encryption is converting of data into
seemingly random, incomprehensible data.seemingly random, incomprehensible data.
Decryption- Decryption is reversing encryption viaDecryption- Decryption is reversing encryption via
the use of Public and Private Keys.the use of Public and Private Keys.
In ConclusionIn Conclusion
 Public Key Cryptography is used in
message authentication and key
distribution.
 Key management is achieved by Digital
Certificates, which are a mechanism that
enables distribution of keys to participants
exchanging information. They ensure the
Confidentiality of these messages and the
Authentication of the participants.
 The strength of Digital Certificates through
X.509 lies, inter alia, in the fact that they
have been standardized by the ITU-T.
 This makes for security in investment and
training, as it is assured Digital Certificates
will be maintained in the future.
In ConclusionIn Conclusion
BibliographyBibliography
 e-Business & e-Commerce: How to Program,e-Business & e-Commerce: How to Program,
1/e,1/e, by H.M. Deitel, P.J. Deitel and T.R, Nieto,by H.M. Deitel, P.J. Deitel and T.R, Nieto,
Prentice Hall, 2000Prentice Hall, 2000
 Cryptography and Network SecurityCryptography and Network Security, 2/e, by, 2/e, by
William Stallings, Prentice Hall, 2000William Stallings, Prentice Hall, 2000
 Electronic Commerce: A ManagerialElectronic Commerce: A Managerial
PerspectivePerspective, 1/e, by Efraim Turban, Jae Lee,, 1/e, by Efraim Turban, Jae Lee,
David King and H.Michael Chung, Prentice Hall,David King and H.Michael Chung, Prentice Hall,
20002000
 http://gsa.gov/ACES
 http://ec.fed.gov
 http://smartcard.gov
 E-commerce, business. technology. society. Second Edition
By: Kenneth C. Laudon, Carol Guercio Traver
 Digital Certificates/Signatures in Electronic Commerce
By: Norman G. Litell ; Visa U.S.A. Risk Management
BibliographyBibliography
 Digital Certificates by: Ann HarrisonDigital Certificates by: Ann Harrison
(Computorworld v34 no33 p58 Ag 14 2000)(Computorworld v34 no33 p58 Ag 14 2000)
 Certificate authorities move in-house:Certificate authorities move in-house:
Group Telecom and PSINet track usersGroup Telecom and PSINet track users
with digital certificates by: Hanna Hurlreywith digital certificates by: Hanna Hurlrey
(Telephony v237 no11 p80 S 13 1999)(Telephony v237 no11 p80 S 13 1999)
BibliographyBibliography
 DIGITAL CERTIFICATES: On goodDIGITAL CERTIFICATES: On good
authority by: Deryck Williamsauthority by: Deryck Williams
(CA Magazine v132 no9 p43-4 N 1999)(CA Magazine v132 no9 p43-4 N 1999)
 Are digital certificates secure? by:Are digital certificates secure? by:
Benjamin HammelBenjamin Hammel
(Communications News 37 no12 D 2000)(Communications News 37 no12 D 2000)
BibliographyBibliography
 PUBLIC KEY CRYPTOGRAPHY:DIGITAL
CERTIFICATES: Study on Attribute Certificates
by:Mwelwa Chibesakunda
(Computer Science Department University of Cape Town May 2002)
BibliographyBibliography

More Related Content

What's hot

Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction pptSubhash Gupta
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking pptHarsh Kevadia
 

What's hot (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography
CryptographyCryptography
Cryptography
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Email security
Email securityEmail security
Email security
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Public Vs. Private Keys
Public Vs. Private KeysPublic Vs. Private Keys
Public Vs. Private Keys
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 

Viewers also liked

CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication ServiceSwathy T
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
History of Web Technology
History of Web TechnologyHistory of Web Technology
History of Web TechnologyShuvo Malakar
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesSymantec
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Accessbluntm64
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Tamim Khan
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration TechnologiesPeter R. Egli
 
Enterprise application integration
Enterprise application integrationEnterprise application integration
Enterprise application integrationGoa App
 

Viewers also liked (13)

CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
History of Web Technology
History of Web TechnologyHistory of Web Technology
History of Web Technology
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Access
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
Enterprise application integration
Enterprise application integrationEnterprise application integration
Enterprise application integration
 
Job descriptions
Job descriptionsJob descriptions
Job descriptions
 

Similar to Digital certificates

PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Explain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfExplain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfashokarians
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2dP2PSystem
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificateKumkum Sharma
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 

Similar to Digital certificates (20)

Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Explain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdfExplain the role of the certificate authority and registration autho.pdf
Explain the role of the certificate authority and registration autho.pdf
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificate
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
Digital signature in vasant kunj
Digital signature in vasant kunjDigital signature in vasant kunj
Digital signature in vasant kunj
 

More from Sheetal Verma (11)

Unit 3a
Unit 3aUnit 3a
Unit 3a
 
Unit 2aa
Unit 2aaUnit 2aa
Unit 2aa
 
Unit 1c
Unit 1cUnit 1c
Unit 1c
 
Unit 1 b
Unit 1 bUnit 1 b
Unit 1 b
 
Unit 1 a
Unit 1 aUnit 1 a
Unit 1 a
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Extra unit 2
Extra unit 2Extra unit 2
Extra unit 2
 
Edi ppt
Edi pptEdi ppt
Edi ppt
 
Edi layer
Edi layerEdi layer
Edi layer
 
Unit 4
Unit 4Unit 4
Unit 4
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Digital certificates

  • 2. What are Digital Certificates?What are Digital Certificates? A digital certificate (DC) is a digital fileA digital certificate (DC) is a digital file that certifies the identity of an individual orthat certifies the identity of an individual or institution, or even a router seekinginstitution, or even a router seeking access to computer- based information. Itaccess to computer- based information. It is issued by a Certification Authority (is issued by a Certification Authority (CACA),), and serves the same purpose as a driver’sand serves the same purpose as a driver’s license or a passport.license or a passport.
  • 3. What are CertificationWhat are Certification Authorities?Authorities? Certification Authorities are the digital world’sCertification Authorities are the digital world’s equivalent to passport offices. They issue digitalequivalent to passport offices. They issue digital certificates and validate holders’ identity andcertificates and validate holders’ identity and authority.authority. They embed an individual or institution’s publicThey embed an individual or institution’s public key along with other identifying information intokey along with other identifying information into each digital certificate and theneach digital certificate and then cryptographically sign it as a tamper-proof sealcryptographically sign it as a tamper-proof seal verifying the integrity of the data within it, andverifying the integrity of the data within it, and validating its use.validating its use.
  • 4. What is the Process of obtaining aWhat is the Process of obtaining a certificate?certificate? 1.Subscriber (sender) generates a publicprivate key pair. Applies to CA for digital certificate with the public key. 2.CA verifies subscriber's identity and issues digital certificate containing the public key. 3.CA publishes certificate to public, on-line repository. 4.Subscriber signs message with private key and sends message to second party. 5.Receiving party verifies digital signature with sender's public key and requests verification of sender's digital certificate from CA's public repository. 6.Repository reports status of subscriber's certificate.
  • 5. Bob’s public key Bob’s identifying information CA private key KB + certificate for Bob’s public key, signed by CA Digital signature (encrypt) KB + KCA - Bob’s public key Bob’s identifying information CA private key KB + certificate for Bob’s public key, signed by CA Digital signature (encrypt) KB + KCA What is the Process in obtaining aWhat is the Process in obtaining a certificate?certificate?
  • 6. Types of Digital CertificatesTypes of Digital Certificates  There are four main types of digitalThere are four main types of digital certificates :-certificates :-  Server CertificatesServer Certificates  Personal CertificatesPersonal Certificates  Organization CertificatesOrganization Certificates  Developer CertificatesDeveloper Certificates
  • 7. Server CertificatesServer Certificates  Allows visitors to exchange personalAllows visitors to exchange personal information such as credit card numbers,information such as credit card numbers, free from the threat of interception orfree from the threat of interception or tampering.tampering.  Server Certificates are a must for buildingServer Certificates are a must for building and designing e-commerce sites asand designing e-commerce sites as confidential information is shared betweenconfidential information is shared between clients, customers and vendors.clients, customers and vendors.
  • 8. Personal CertificatesPersonal Certificates  Personal Certificates allow one to authenticate aPersonal Certificates allow one to authenticate a visitor’s identity and restrict access to specifiedvisitor’s identity and restrict access to specified content to particular visitors.content to particular visitors.  Personal Certificates are perfect for business toPersonal Certificates are perfect for business to business communications such as offeringbusiness communications such as offering suppliers and partners controlled access tosuppliers and partners controlled access to special web sites for updating productspecial web sites for updating product availability, shipping dates and inventoryavailability, shipping dates and inventory management.management.
  • 9. Organization & DeveloperOrganization & Developer CertificatesCertificates  Organization Certificates are used byOrganization Certificates are used by corporate entities to identify employees forcorporate entities to identify employees for secure e-mail and web-based transaction.secure e-mail and web-based transaction.  Developer Certificates prove authorshipDeveloper Certificates prove authorship and retain integrity of distributed softwareand retain integrity of distributed software programs e.g. installing a software on aprograms e.g. installing a software on a computer system in most instancescomputer system in most instances requires what is called a “serial key”requires what is called a “serial key”
  • 10. What Does a Digital CertificateWhat Does a Digital Certificate Contain?Contain? It contains yourIt contains your namename, a, a serial numberserial number,, expiration dateexpiration date,, a copy of the certificate-a copy of the certificate- holder'sholder's public keypublic key (used for encrypting(used for encrypting messages andmessages and digital signaturedigital signaturess), and), and thethe digital signature of the certificate-issuingdigital signature of the certificate-issuing authorityauthority so that a recipient can verify thatso that a recipient can verify that the certificate is real. Some digitalthe certificate is real. Some digital certificates conform to the X.509 standard.certificates conform to the X.509 standard.
  • 11. Example of a Certificate:Example of a Certificate:  Serial number (unique to issuer)Serial number (unique to issuer)  info about certificate owner, including algorithminfo about certificate owner, including algorithm and key value itself (not shown)and key value itself (not shown)  info about certificate issuerinfo about certificate issuer  valid datesvalid dates  digital signature by issuerdigital signature by issuer
  • 12. Why are they Used?Why are they Used? There are four(4) main uses:There are four(4) main uses: 1.1. Proving the Identity of the sender of a transactionProving the Identity of the sender of a transaction 2.2. Non Repudiation –Non Repudiation – the owner of the certificate cannot denythe owner of the certificate cannot deny partaking in the transactionpartaking in the transaction 3.3. Encryption and checking the integrity of data -Encryption and checking the integrity of data - provideprovide the receiver with the means to encode a reply.the receiver with the means to encode a reply. 4.4. Single Sign-On -Single Sign-On - It can be used to validate a user and logIt can be used to validate a user and log them into various computer systems without having to use athem into various computer systems without having to use a different password for each systemdifferent password for each system
  • 13. Public & Private KeysPublic & Private Keys Public and Private Key pairs comprise of twoPublic and Private Key pairs comprise of two uniquely related cryptographic keys.uniquely related cryptographic keys. Public key is made accessible to everyone,Public key is made accessible to everyone, whereas Private key remains confidential to itswhereas Private key remains confidential to its respective owner.respective owner. Since both keys are mathematically related onlySince both keys are mathematically related only the corresponding private key can decrypt theirthe corresponding private key can decrypt their corresponding public key.corresponding public key.
  • 14. How do You Obtain An Individual’sHow do You Obtain An Individual’s Public Key?Public Key?  When Alice wants Bob’s public key:When Alice wants Bob’s public key: • Alice gets Bob’s certificate (from Bob or elsewhere).Alice gets Bob’s certificate (from Bob or elsewhere). • apply CA’s public key to Bob’s certificate, get Bob’s publicapply CA’s public key to Bob’s certificate, get Bob’s public keykey KB + digital signature (decrypt) KB + CA public key KCA Bob’s public key
  • 15. Where are Digital CertificatesWhere are Digital Certificates Used?Used?  In a number of Internet applications that include:  1.Secure Socket Layer (SSL) developed by Netscape Communications Corporation  2. Secure Multipurpose Internet Mail Extensions (S/MIME) Standard for securing email and electronic data interchange (EDI).
  • 16.  3. Secure Electronic Transactions (SET) protocol for securing electronic payments  4. Internet Protocol Secure Standard (IPSec) for authenticating networking devices Where are Digital CertificatesWhere are Digital Certificates Used?Used?
  • 17. How Digital Certificates are UsedHow Digital Certificates are Used for Message Encryptionfor Message Encryption
  • 18. Why do I need a Digital Certificate?Why do I need a Digital Certificate?  Virtual malls, electronic banking and otherVirtual malls, electronic banking and other electronic services are a commonplaceelectronic services are a commonplace offering service from the luxury of one’soffering service from the luxury of one’s home. One’s concern about privacy andhome. One’s concern about privacy and security may prevent you from takingsecurity may prevent you from taking advantage of the luxury; this is whereadvantage of the luxury; this is where digital certificate comes in.digital certificate comes in.
  • 19. Why do I need a Digital Certificate?Why do I need a Digital Certificate?  Encryption alone is not enough as itEncryption alone is not enough as it provides no proof of the identity of theprovides no proof of the identity of the sender of the encrypted information. Usedsender of the encrypted information. Used in conjunction with Encryption, Digitalin conjunction with Encryption, Digital Certificates provides a more completeCertificates provides a more complete security solution, assuring the identity ofsecurity solution, assuring the identity of all the parties involved in a transaction.all the parties involved in a transaction.
  • 20. How do I view Digital CertificatesHow do I view Digital Certificates on my PC?on my PC?  For MS Explorer Users:-For MS Explorer Users:-  Open your MS Internet ExplorerOpen your MS Internet Explorer  Click on the Tools MenuClick on the Tools Menu  From the drop down list, select InternetFrom the drop down list, select Internet optionsoptions  Click the Content tabClick the Content tab  Click the certificates buttonClick the certificates button
  • 21. Example of an MS ExplorerExample of an MS Explorer Certificate.Certificate.
  • 22. How do I view Digital CertificatesHow do I view Digital Certificates on my PC?on my PC?  For Netscape users:-For Netscape users:-  Open your Netscape CommunicatorOpen your Netscape Communicator  Click on the Communicator MenuClick on the Communicator Menu  From the drop down list select the Tools andFrom the drop down list select the Tools and then Security infothen Security info  Click on the Certificates link to view and learnClick on the Certificates link to view and learn more about each certificate type stored bymore about each certificate type stored by NetscapeNetscape
  • 23. Example of a Netscape CertificateExample of a Netscape Certificate
  • 24. Advantages of Digital CertificatesAdvantages of Digital Certificates  Decrease the number of passwords a user has to remember to gain access to different network domains.  They create an electronic audit trail that allows companies to track down who executed a transaction or accessed an area.
  • 25. Do Digital Certificates HaveDo Digital Certificates Have Vulnerabilities?Vulnerabilities?  One problem with a digital certificate isOne problem with a digital certificate is where it resides once it is obtained.where it resides once it is obtained.  The owner's certificate sits on hisThe owner's certificate sits on his computer, and it is the sole responsibilitycomputer, and it is the sole responsibility of the owner to protect it.of the owner to protect it.  If the owner walks away from hisIf the owner walks away from his computer, others can gain access to it andcomputer, others can gain access to it and use his digital certificate to executeuse his digital certificate to execute unauthorized business.unauthorized business.
  • 26.  The best way to address the vulnerabilitiesThe best way to address the vulnerabilities of digital certificates is by combining themof digital certificates is by combining them with biometric technology, as that confirmswith biometric technology, as that confirms the actual identity of the sender, ratherthe actual identity of the sender, rather than the computer.than the computer. Do Digital Certificates HaveDo Digital Certificates Have Vulnerabilities?Vulnerabilities?
  • 27. GlossaryGlossary PKI – Public Key Infrastructure (PKI) provides aPKI – Public Key Infrastructure (PKI) provides a framework for addressing the previouslyframework for addressing the previously illustrated fundamentals of security listed above.illustrated fundamentals of security listed above. Encryption- Encryption is converting of data intoEncryption- Encryption is converting of data into seemingly random, incomprehensible data.seemingly random, incomprehensible data. Decryption- Decryption is reversing encryption viaDecryption- Decryption is reversing encryption via the use of Public and Private Keys.the use of Public and Private Keys.
  • 28. In ConclusionIn Conclusion  Public Key Cryptography is used in message authentication and key distribution.  Key management is achieved by Digital Certificates, which are a mechanism that enables distribution of keys to participants exchanging information. They ensure the Confidentiality of these messages and the Authentication of the participants.
  • 29.  The strength of Digital Certificates through X.509 lies, inter alia, in the fact that they have been standardized by the ITU-T.  This makes for security in investment and training, as it is assured Digital Certificates will be maintained in the future. In ConclusionIn Conclusion
  • 30. BibliographyBibliography  e-Business & e-Commerce: How to Program,e-Business & e-Commerce: How to Program, 1/e,1/e, by H.M. Deitel, P.J. Deitel and T.R, Nieto,by H.M. Deitel, P.J. Deitel and T.R, Nieto, Prentice Hall, 2000Prentice Hall, 2000  Cryptography and Network SecurityCryptography and Network Security, 2/e, by, 2/e, by William Stallings, Prentice Hall, 2000William Stallings, Prentice Hall, 2000  Electronic Commerce: A ManagerialElectronic Commerce: A Managerial PerspectivePerspective, 1/e, by Efraim Turban, Jae Lee,, 1/e, by Efraim Turban, Jae Lee, David King and H.Michael Chung, Prentice Hall,David King and H.Michael Chung, Prentice Hall, 20002000
  • 31.  http://gsa.gov/ACES  http://ec.fed.gov  http://smartcard.gov  E-commerce, business. technology. society. Second Edition By: Kenneth C. Laudon, Carol Guercio Traver  Digital Certificates/Signatures in Electronic Commerce By: Norman G. Litell ; Visa U.S.A. Risk Management BibliographyBibliography
  • 32.  Digital Certificates by: Ann HarrisonDigital Certificates by: Ann Harrison (Computorworld v34 no33 p58 Ag 14 2000)(Computorworld v34 no33 p58 Ag 14 2000)  Certificate authorities move in-house:Certificate authorities move in-house: Group Telecom and PSINet track usersGroup Telecom and PSINet track users with digital certificates by: Hanna Hurlreywith digital certificates by: Hanna Hurlrey (Telephony v237 no11 p80 S 13 1999)(Telephony v237 no11 p80 S 13 1999) BibliographyBibliography
  • 33.  DIGITAL CERTIFICATES: On goodDIGITAL CERTIFICATES: On good authority by: Deryck Williamsauthority by: Deryck Williams (CA Magazine v132 no9 p43-4 N 1999)(CA Magazine v132 no9 p43-4 N 1999)  Are digital certificates secure? by:Are digital certificates secure? by: Benjamin HammelBenjamin Hammel (Communications News 37 no12 D 2000)(Communications News 37 no12 D 2000) BibliographyBibliography
  • 34.  PUBLIC KEY CRYPTOGRAPHY:DIGITAL CERTIFICATES: Study on Attribute Certificates by:Mwelwa Chibesakunda (Computer Science Department University of Cape Town May 2002) BibliographyBibliography