SlideShare uma empresa Scribd logo
1 de 21
Digital Certificates
Introduction
What is cryptography?
The art of secret writing
• Cryptosystems
• keys
Problem
Problem: How does Alice know that the public key
she received is really Bob’s public key?
Digital Certificate
• Electronic counterparts to driver licenses, passports
• Prove your identity or right to access information or
services online
• Bind an identity to a pair of electronic keys
• Provide a more complete security solution
• Role of Certification Authority (CA)
Digital Certificates
• Structure of Digital Certificate
– Owner's public key
– Owner's name
– Expiration date of the public key
– Name of the issuer (the CA that issued the Digital
Certificate)
– Serial number of the Digital Certificate
– Digital signature of the issuer
• Defined by CCITT X.509 international
standard
Digital Certificates
• Provide support for public key cryptography (PKC)
• Digital certificates contain the public key of the entity
• It rely on PKC for their own authentication
• Used on handheld devices, mobile phones, on
portable cards, smart cards
public key infrastructure (PKI)
A public key infrastructure (PKI) consists of the
components necessary to securely distribute public
keys
It consists of:
– Certificates
– Certificate authorities (CAs)
– A repository for retrieving certificates
– A method for revoking certificates
– A method of evaluating a chain of certificates
Public Key Infrastructures (PKIs)
• To use public key methods, an organization
must establish a comprehensive Public Key
Infrastructure (PKI)
– A PKI automates most aspects of using public key
encryption and authentication
– Uses a PKI Server
Public Key Infrastructures (PKIs)
• PKI Server Creates Public Key-Private Key Pairs
– Distributes private keys to applicants securely
– Often, private keys are embedded in delivered
software
PKI
Server
Private Key
Public Key Infrastructures (PKIs)
• PKI Server Provides Certificate Revocation
list (CRL) Checks
– Distributes digital certificates to verifiers
– Checks certificate revocation list before sending
digital certificates
PKI
Server
Digital Certificate
Public Key Infrastructures (PKIs)
• CRL Checks
– If applicant gives verifier a digital certificate,
– The verifier must check the certificate revocation
list
PKI
Server
OK?
OK or Revoked
CRL
Generating the digital certificate
Digital Certificate : Example
Use of Digital Certificates
• Electronic transactions
– E-mail
– Electronic commerce
– Groupware
– Electronic funds transfers
• Netscape's Enterprise Server
Message Encryption
Message Decryption
Use of Digital Certificates
Need of Digital Certificates
• Proper Privacy and Security
• Trust
• Special safeguards
• Assuring the identity of all parties
• To provide legitimate content
Digital Certificate Services
• Services
– Issuing
– Revocation
– Status services
• Types of Digital Certificates
– Server
– Developer (For softwares)
– personal
Digital Signature
• Function as hand written signature
electronically
• Non repudiated
• Enable "authentication" of digital messages
DC used for Digital signature and
Encryption
DC used for Digital signature and
Decryption
References
• www.ifour-consultancy.com

Mais conteúdo relacionado

Mais procurados

PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 

Mais procurados (20)

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Kerberos
KerberosKerberos
Kerberos
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Key management
Key managementKey management
Key management
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
IT ACT 2008 ALA GTU
IT ACT 2008 ALA  GTUIT ACT 2008 ALA  GTU
IT ACT 2008 ALA GTU
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 

Destaque

Destaque (8)

Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
History of Web Technology
History of Web TechnologyHistory of Web Technology
History of Web Technology
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Access
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...Getting started with Enterprise Application Integration (EAI) using Enterpris...
Getting started with Enterprise Application Integration (EAI) using Enterpris...
 
Enterprise Application Integration Technologies
Enterprise Application Integration TechnologiesEnterprise Application Integration Technologies
Enterprise Application Integration Technologies
 
Enterprise application integration
Enterprise application integrationEnterprise application integration
Enterprise application integration
 

Semelhante a Digital certificates and information security

Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
DigiCert, Inc.
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptx
RAMESHMRA21130030110
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 

Semelhante a Digital certificates and information security (20)

Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Alpha Education
Alpha EducationAlpha Education
Alpha Education
 
Information Security Lesson 9 - Keys - Eric Vanderburg
Information Security Lesson 9 - Keys - Eric VanderburgInformation Security Lesson 9 - Keys - Eric Vanderburg
Information Security Lesson 9 - Keys - Eric Vanderburg
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptx
 
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
 
E collaborationscottrea
E collaborationscottreaE collaborationscottrea
E collaborationscottrea
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
Dapp
DappDapp
Dapp
 
TOP FEATURES OF CertiDApp
TOP FEATURES OF CertiDAppTOP FEATURES OF CertiDApp
TOP FEATURES OF CertiDApp
 
Https
HttpsHttps
Https
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Digital certificates and information security

  • 2. Introduction What is cryptography? The art of secret writing • Cryptosystems • keys
  • 3. Problem Problem: How does Alice know that the public key she received is really Bob’s public key?
  • 4. Digital Certificate • Electronic counterparts to driver licenses, passports • Prove your identity or right to access information or services online • Bind an identity to a pair of electronic keys • Provide a more complete security solution • Role of Certification Authority (CA)
  • 5. Digital Certificates • Structure of Digital Certificate – Owner's public key – Owner's name – Expiration date of the public key – Name of the issuer (the CA that issued the Digital Certificate) – Serial number of the Digital Certificate – Digital signature of the issuer • Defined by CCITT X.509 international standard
  • 6. Digital Certificates • Provide support for public key cryptography (PKC) • Digital certificates contain the public key of the entity • It rely on PKC for their own authentication • Used on handheld devices, mobile phones, on portable cards, smart cards
  • 7. public key infrastructure (PKI) A public key infrastructure (PKI) consists of the components necessary to securely distribute public keys It consists of: – Certificates – Certificate authorities (CAs) – A repository for retrieving certificates – A method for revoking certificates – A method of evaluating a chain of certificates
  • 8. Public Key Infrastructures (PKIs) • To use public key methods, an organization must establish a comprehensive Public Key Infrastructure (PKI) – A PKI automates most aspects of using public key encryption and authentication – Uses a PKI Server
  • 9. Public Key Infrastructures (PKIs) • PKI Server Creates Public Key-Private Key Pairs – Distributes private keys to applicants securely – Often, private keys are embedded in delivered software PKI Server Private Key
  • 10. Public Key Infrastructures (PKIs) • PKI Server Provides Certificate Revocation list (CRL) Checks – Distributes digital certificates to verifiers – Checks certificate revocation list before sending digital certificates PKI Server Digital Certificate
  • 11. Public Key Infrastructures (PKIs) • CRL Checks – If applicant gives verifier a digital certificate, – The verifier must check the certificate revocation list PKI Server OK? OK or Revoked CRL
  • 12. Generating the digital certificate
  • 14. Use of Digital Certificates • Electronic transactions – E-mail – Electronic commerce – Groupware – Electronic funds transfers • Netscape's Enterprise Server
  • 15. Message Encryption Message Decryption Use of Digital Certificates
  • 16. Need of Digital Certificates • Proper Privacy and Security • Trust • Special safeguards • Assuring the identity of all parties • To provide legitimate content
  • 17. Digital Certificate Services • Services – Issuing – Revocation – Status services • Types of Digital Certificates – Server – Developer (For softwares) – personal
  • 18. Digital Signature • Function as hand written signature electronically • Non repudiated • Enable "authentication" of digital messages
  • 19. DC used for Digital signature and Encryption
  • 20. DC used for Digital signature and Decryption