SlideShare uma empresa Scribd logo
1 de 14
 A digital certificate is equivalent to an 
electronic id card. 
It serves two purposes: 
 To establish the identity of the owner of the 
certificate. 
 To distribute the owner's public key
Web Server Certificates: 
These are the electronic equivalent of a 
business license. 
It assures potential customers that the 
site they are visiting is a legitimate 
business.
Developer Certificates: 
These certificates enable developers to sign 
software and macros and deliver them safely to 
customers over the Internet. 
The customer can be confident that the 
software or macros are legitimate. 
Personal Certificates: 
These certificates secures e-mail 
conversations and access to corporate web 
servers.
Service Thawte Verisign 
Server 
certificates 
Initial server 
certificates 
$125 $349 
Server 
certificate 
renewal 
$100 $249 
Personal 
certificates 
Class1 Free $14.95 
Class2 $20 $14.95 
Developer 
certificates 
Initial certificate $200 $100 
Renewal $100 $400
How DCs Protect the Data 
1. Encryption & Digital Certificates are the solution for 
Internet Commerce. Used together, they protect your 
data as it travels over the Internet. 
2. Encryption is the process of using a mathematical 
algorithm to transform information into a format that 
can't be read (this format is called cipher text). 
Decryption is the process of using another algorithm 
to transform encrypted information back into a 
readable format (this format is called plain text). 
3. Digital Certificates are your digital passport, an 
Internet ID. They are verification of you who you are 
and the integrity of your data
Digital Certificates Protect & Secure: 
 Authentication: 
This is digital verification of who you are, much 
in the same way your driver's license proves 
your identity. It is very easy to send spoofed 
email. 
 Integrity: 
This is the verification that the data you sent 
has not been altered. When email or other data 
travels across the Internet, it routes through 
various gateways (way stations). It is possible 
for people to capture, alter, then resend the 
message.
 Encryption: 
This ensures that your data was unable to 
be read or utilized by any party while in transit. Your 
message is encrypted into incomprehensible gibberish 
before it leaves your computer. It maintains it 
encrypted (gibberish) state during it's travel through 
the Internet. It is not de-crypt until the recipient 
receives it. Because of the public-key cryptography 
used (discussed later) only the recipient can decipher 
the received message, no one else can.
Token verification: 
Digital tokens replace your password which 
can be easily guessed. Tokens offer a more secure 
way of access to sensitive data. The most 
common way to secure data or a web site is with 
passwords. Before anyone access the data, they 
are prompted with their user login id and 
password. However, this is easily cracked using 
various security software (such as Crack 5.0, etc.). 
Also, passwords can be found with other means, 
such as social engineering. Passwords are not 
secure. Token verification is more secure.
Requesting certificates 
Certificate Request 
 To get a certificate, you must send a certificate request to 
the CA. 
 It includes the following: 
1. The distinguished name of the owner (the user for 
whom the certificate is being requested). 
2. The public key of the owner. 
3. The digital signature of the owner.
Contents of a digital certificate : 
A certificate contains several pieces of 
information, including information about the owner of 
the certificate and the issuing CA. Specifically, a 
certificate includes: 
1. The distinguished name (DN) of the owner. A DN is a 
unique identifier, a fully qualified name including not 
only the common name (CN) of the owner, but the 
owner's organization and other distinguishing 
information. 
2. The public key of the owner.
3. The date on which the certificate was issued. 
4. The date on which the certificate expires. 
5. The distinguished name of the issuing CA. 
6. The digital signature of the issuing CA. (The 
message-digest function is run over all the 
preceding fields.)
Digital Certificates provide a way to authenticate 
communication on the Internet. They come in three 
flavors: personal, web server, and developer certificates. 
Personal certificates are primarily used for e-mail. 
Universal acceptance and widespread use will 
depend on the industry’s ability to communicate in 
understandable terms and the development of a true 
standard 
Four factors 
1. Cost 
2. Compatibility 
3. Perceived need 
4. Familiarity
Thank you

Mais conteúdo relacionado

Mais procurados

Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
Ashvini Soni
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Ishwar Dayal
 

Mais procurados (20)

Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
PKI by Tim Polk
PKI by Tim PolkPKI by Tim Polk
PKI by Tim Polk
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Cryptography
CryptographyCryptography
Cryptography
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
Digital Certificate Email usage
Digital Certificate Email usageDigital Certificate Email usage
Digital Certificate Email usage
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
SSl and certificates
SSl and certificatesSSl and certificates
SSl and certificates
 

Semelhante a Digital certificates

Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificate
Kumkum Sharma
 

Semelhante a Digital certificates (20)

Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Kumkum digital certificate
Kumkum digital certificateKumkum digital certificate
Kumkum digital certificate
 
E-Business security
E-Business security E-Business security
E-Business security
 
Unit v
Unit vUnit v
Unit v
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Digital certificate
Digital certificateDigital certificate
Digital certificate
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 

Mais de Deevena Dayaal

Mais de Deevena Dayaal (20)

Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Wimax
WimaxWimax
Wimax
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Smart dust
Smart dustSmart dust
Smart dust
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Satellite phones
Satellite phonesSatellite phones
Satellite phones
 
Rolltops
RolltopsRolltops
Rolltops
 
Redtacton
RedtactonRedtacton
Redtacton
 
Windows8
Windows8Windows8
Windows8
 
Nokia morph
Nokia morphNokia morph
Nokia morph
 
Mind reading computer
Mind reading computerMind reading computer
Mind reading computer
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Haptics
HapticsHaptics
Haptics
 
Dna computing
Dna computingDna computing
Dna computing
 
Halographic data storage
Halographic data storageHalographic data storage
Halographic data storage
 
Gsm network
Gsm networkGsm network
Gsm network
 
Globus toolkit in grid
Globus toolkit in gridGlobus toolkit in grid
Globus toolkit in grid
 
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technology
 
Fuel cells
Fuel cellsFuel cells
Fuel cells
 
Firewalls
FirewallsFirewalls
Firewalls
 

Último

Último (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Digital certificates

  • 1.
  • 2.  A digital certificate is equivalent to an electronic id card. It serves two purposes:  To establish the identity of the owner of the certificate.  To distribute the owner's public key
  • 3. Web Server Certificates: These are the electronic equivalent of a business license. It assures potential customers that the site they are visiting is a legitimate business.
  • 4. Developer Certificates: These certificates enable developers to sign software and macros and deliver them safely to customers over the Internet. The customer can be confident that the software or macros are legitimate. Personal Certificates: These certificates secures e-mail conversations and access to corporate web servers.
  • 5. Service Thawte Verisign Server certificates Initial server certificates $125 $349 Server certificate renewal $100 $249 Personal certificates Class1 Free $14.95 Class2 $20 $14.95 Developer certificates Initial certificate $200 $100 Renewal $100 $400
  • 6. How DCs Protect the Data 1. Encryption & Digital Certificates are the solution for Internet Commerce. Used together, they protect your data as it travels over the Internet. 2. Encryption is the process of using a mathematical algorithm to transform information into a format that can't be read (this format is called cipher text). Decryption is the process of using another algorithm to transform encrypted information back into a readable format (this format is called plain text). 3. Digital Certificates are your digital passport, an Internet ID. They are verification of you who you are and the integrity of your data
  • 7. Digital Certificates Protect & Secure:  Authentication: This is digital verification of who you are, much in the same way your driver's license proves your identity. It is very easy to send spoofed email.  Integrity: This is the verification that the data you sent has not been altered. When email or other data travels across the Internet, it routes through various gateways (way stations). It is possible for people to capture, alter, then resend the message.
  • 8.  Encryption: This ensures that your data was unable to be read or utilized by any party while in transit. Your message is encrypted into incomprehensible gibberish before it leaves your computer. It maintains it encrypted (gibberish) state during it's travel through the Internet. It is not de-crypt until the recipient receives it. Because of the public-key cryptography used (discussed later) only the recipient can decipher the received message, no one else can.
  • 9. Token verification: Digital tokens replace your password which can be easily guessed. Tokens offer a more secure way of access to sensitive data. The most common way to secure data or a web site is with passwords. Before anyone access the data, they are prompted with their user login id and password. However, this is easily cracked using various security software (such as Crack 5.0, etc.). Also, passwords can be found with other means, such as social engineering. Passwords are not secure. Token verification is more secure.
  • 10. Requesting certificates Certificate Request  To get a certificate, you must send a certificate request to the CA.  It includes the following: 1. The distinguished name of the owner (the user for whom the certificate is being requested). 2. The public key of the owner. 3. The digital signature of the owner.
  • 11. Contents of a digital certificate : A certificate contains several pieces of information, including information about the owner of the certificate and the issuing CA. Specifically, a certificate includes: 1. The distinguished name (DN) of the owner. A DN is a unique identifier, a fully qualified name including not only the common name (CN) of the owner, but the owner's organization and other distinguishing information. 2. The public key of the owner.
  • 12. 3. The date on which the certificate was issued. 4. The date on which the certificate expires. 5. The distinguished name of the issuing CA. 6. The digital signature of the issuing CA. (The message-digest function is run over all the preceding fields.)
  • 13. Digital Certificates provide a way to authenticate communication on the Internet. They come in three flavors: personal, web server, and developer certificates. Personal certificates are primarily used for e-mail. Universal acceptance and widespread use will depend on the industry’s ability to communicate in understandable terms and the development of a true standard Four factors 1. Cost 2. Compatibility 3. Perceived need 4. Familiarity