An introduction to X.509 certificates

Stephane Potier
Stephane PotierMarketing Manager France at B&R em B&R Industrial Automation
An introduction to
X.509 certificates
Stéphane Potier
stephane.potier [at] br-automation.com
Basics of cryptography
Symmetric cryptography
Private/Public-key algorithms
Secure Hash Function
Digital Signature
Symmetric cryptography
Symmetric cryptography (e.g. AES) is used for data encryption
A secret ciphering key is used for both encryption and decryption (128 or 256 bits
recommended)
The secret ciphering key must be known by both client and server, it must be exchanged in a
secure way between them
Based on secret ciphering key
Public and Private Key pair
The Public and Private Key pair comprise of two uniquely
mathematically related cryptographic keys
• A public key is made available to everyone
• A private key is confidential to its owner
Whatever is encrypted with a Public Key may only be decrypted
by its corresponding Private Key and vice versa
Public and Private Key pair is used by :
• Asymmetrical cryptography, for confidentiality
• Digital signature, for authentication
Unpredictable large random numbers
Asymmetrical cryptography
Public-key cryptography is a class of cryptographic protocols based on algorithms that require
Public and Private Key pair
• Public Key may be disseminated widely, Private Key is secret and only known by the owner
• The Public Key is used to encrypt the message, the Private Key to decrypt it
• For example, Bob uses the Public Key of Alice to encrypt a message. Alice is the only one that can decrypt the message. The
message remains confidential to anyone else since they do not know Alice’s Private Key.
Public-key algorithm
Secure Hash Algorithm (SHA)
Hash functions are used to map data of arbitrary size to data of fixed size
In cryptography, hash function produce a checksum (hash value) used to verify data integrity
A cryptographic hash function has following characteristics:
• Minor change in the input data completely change the hash value
• Easy verification that some input data maps to a given hash value
• Difficulty to reconstruct input data from hash value
SHA (Secure Hash Algorithm) is a
famous cryptographic hash function
• SHA0 is obsolete
• SHA1 is deprecated since 31/12/2016
• SHA2 is currently recommended
• SHA3 are newest version
Integrity of data
Digital signature
Digital signature ensure authentication and integrity of data
• Asymmetric cryptography used for data authentication
• Cryptographic hash function used for data integrity
Authentication and integrity of data
Combining symmetric and asymmetric algorithms
Symmetric cryptography
• Fast encryption requiring less processing power
• Secure exchange of ciphering key is necessary
Asymmetric cryptography
• Slow encryption method based on long keys (2048 bits)
• Requires public key infrastructure
Exchange of session key between Bob and Alice via asymmetric cryptography , then
symmetric cryptography based on this session key
Session key exchange
Basics of
X.509 certificates
X.509 certificate
A digital certificate certifies the ownership of a public key by the named subject of the
certificate
The digital certificate itself is protected by a digital signature whose authenticity can be verified
by the public key of the Certification Authority (CA) that issued the certificate
Ensuring authenticity and integrity
Certification Authority (CA)
Certification Authority (CA) issues certificates
Certificate is signed with the private key of the CA
CA’s private key must be very private, it is the basis of all trust for issued certificates
Trusted third party issuing certificates
Obtaining digital certificate
A certificate signing request (CSR) is sent from an applicant to a certificate authority in order
to apply for a digital identity certificate
Certificate signing request
Verifying digital certificate
Authentication and Integrity of a certificate is verified using the Public Key of the Certification
Authority that issued that certificate
Authentication and Integrity check
Certification path
Chain of trust
• A certificate contains its issuer (CA that signed it)
• The issuer’s certificate also contains its issuer (CA that signed issuer’s certificate)
• This chain of certificates is called a certification path
Digital certificates are verified using a chain of trust
Root certificate
A root certificate is the top-most certificate of the certification path
A root certificate is issued by a trusted certificate authority (CA), which self-sign it
The root certificate is usually made trustworthy by secure physical distribution (distributed with
operating system)
Top-most certificate of the certification path
Self-signed
Verification of digital certificates
1. Client (i.e. web browser) initiate a TLS handshake with Amazon website, and gets certificates for both Amazon and Symantec
2. Client verifies Amazon’s certificate using Symantec’s Public Key contained in Symantec’s certificate
3. Client verifies Symantec’s certificate using VeriSign’s Public Key contained in VeriSign’s certificate (VeriSign’s certificate is a root
certificate locally stored on the client by the operating system)
Digital certificates are verified using a chain of trust
Self-signed certificate
A self-signed certificate :
• Is signed by issuer to identify itself
• Is signed by issuer with its own private key
• Has no Certificate Authority
The benefits:
• Self-signed certificates are free of charge (unlike CA issued certificates)
The risks :
• Self-signed certificates are not issued by a trusted certificate authority (1)
• Since client can not trust this self-signed certificate, it will raise a warning
• Users must avoid being “trained” to bypass warnings or add exceptions
→ An entity accepting a self-signed certificate must follow similar trusting process than the
addition of a new CA certificate
(1) Excepted for root certificates that are self-signed and issued by trusted certification authority
Risks and benefits
X.509 certificate encodings and file extensions
DER vs. CRT vs. CER vs. PEM
Certificate encodings Encoding type
PEM (Privacy Enhanced Mail) Base64 ASCII encoding
DER (Distinguished Encoding Rules) Binary encoding
Certificate file extension Encoding type
.cer PEM or DER
.crt PEM or DER
.der DER
.pem PEM
DER encoded, .cer file extension, certificate
PEM encoded, .pem file extension, certificate
Certificate store
A certificate store is used to store and manage digital certificates
Certificate store usually contains :
• Own private keys
• Own certificates
• Trusted 3rd party certificates
• Revocation list (certificates revoked by the issuing CA before their scheduled expiration date and should no longer be trusted)
Most well-known root certificates are usually stored in the certificate store
It is possible to add a root (signed by CA) certificate or a self-signed certificate in the
certificate store
Only add a trusted certificate in the certificate store !!!
Storage of digital certificates
Expired certificate
Every certificate has an expiry date, meaning the time and date past which the certificate is no
longer valid
The client determines what happens once certificate expires on a server
• The client can not connect to the server
• A warning is raised to indicate certificate has expired
• …
Before current certificate expires, a new certificate must be installed in the server
Validity date expiry
PERFECTION IN AUTOMATION
1 de 21

Recomendados

SSL/TLS por
SSL/TLSSSL/TLS
SSL/TLSSirish Kumar
1.4K visualizações12 slides
2. public key cryptography and RSA por
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
2.3K visualizações24 slides
Secure Socket Layer por
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
39.1K visualizações54 slides
18CS2005 Cryptography and Network Security por
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
565 visualizações91 slides
Symmetric and Asymmetric Encryption.ppt por
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptHassanAli980906
237 visualizações14 slides
Secure shell ppt por
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
16.5K visualizações38 slides

Mais conteúdo relacionado

Mais procurados

Diffie Hellman Key Exchange por
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key ExchangeSAURABHDHAGE6
347 visualizações26 slides
The CIA Triad - Assurance on Information Security por
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
11.2K visualizações3 slides
Cryptography por
CryptographyCryptography
CryptographyPratiksha Patil
12.4K visualizações31 slides
Transport Layer Security (TLS) por
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
11K visualizações11 slides
public key infrastructure por
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
23.4K visualizações24 slides
CRYPTOGRAPHY AND NETWORK SECURITY por
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
10.6K visualizações127 slides

Mais procurados(20)

Diffie Hellman Key Exchange por SAURABHDHAGE6
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
SAURABHDHAGE6347 visualizações
The CIA Triad - Assurance on Information Security por Bharath Rao
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
Bharath Rao11.2K visualizações
Cryptography por Pratiksha Patil
CryptographyCryptography
Cryptography
Pratiksha Patil12.4K visualizações
Transport Layer Security (TLS) por Arun Shukla
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla11K visualizações
public key infrastructure por vimal kumar
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar23.4K visualizações
CRYPTOGRAPHY AND NETWORK SECURITY por Kathirvel Ayyaswamy
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy10.6K visualizações
Secure socket layer por Nishant Pahad
Secure socket layerSecure socket layer
Secure socket layer
Nishant Pahad901 visualizações
X.509 Certificates por Sou Jana
X.509 CertificatesX.509 Certificates
X.509 Certificates
Sou Jana476 visualizações
Secure Socket Layer por Abhishek Gupta
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Abhishek Gupta536 visualizações
Pgp pretty good privacy por Pawan Arya
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya69.8K visualizações
Introduction to Cryptography por Md. Afif Al Mamun
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Md. Afif Al Mamun13.3K visualizações
Pretty good privacy por Pushkar Dutt
Pretty good privacyPretty good privacy
Pretty good privacy
Pushkar Dutt8.6K visualizações
Data encryption por Deepam Goyal
Data encryptionData encryption
Data encryption
Deepam Goyal16.7K visualizações
Digital Signature por Mohamed Talaat
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat8.6K visualizações
Kerberos por Sutanu Paul
KerberosKerberos
Kerberos
Sutanu Paul12.7K visualizações
6. cryptography por 7wounders
6. cryptography6. cryptography
6. cryptography
7wounders5.6K visualizações

Similar a An introduction to X.509 certificates

SSL por
SSLSSL
SSLBadrul Alam bulon
8.8K visualizações31 slides
presentation2-151203145018-lva1-app6891.pdf por
presentation2-151203145018-lva1-app6891.pdfpresentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdfGumanSingh10
5 visualizações31 slides
Certificate pinning in android applications por
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
696 visualizações47 slides
Certificates, PKI, and SSL/TLS for infrastructure builders and operators por
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsDavid Ochel
366 visualizações29 slides
Track 5 session 2 - st dev con 2016 - security iot best practices por
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
1.2K visualizações40 slides
Authentication services por
Authentication servicesAuthentication services
Authentication servicesGreater Noida Institute Of Technology
1.4K visualizações23 slides

Similar a An introduction to X.509 certificates(20)

presentation2-151203145018-lva1-app6891.pdf por GumanSingh10
presentation2-151203145018-lva1-app6891.pdfpresentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
GumanSingh105 visualizações
Certificate pinning in android applications por Arash Ramez
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
Arash Ramez696 visualizações
Certificates, PKI, and SSL/TLS for infrastructure builders and operators por David Ochel
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
David Ochel366 visualizações
Track 5 session 2 - st dev con 2016 - security iot best practices por ST_World
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World 1.2K visualizações
Apple SSL Vulnerability Explained por Mike Chapple
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
Mike Chapple1.9K visualizações
Dr. Omar Ali Alibrahim - Ssl talk por promediakw
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
promediakw1.6K visualizações
The world of encryption por Mohammad Yousri
The world of encryptionThe world of encryption
The world of encryption
Mohammad Yousri796 visualizações
[Note]x509 por Yu-Ting Chen
[Note]x509[Note]x509
[Note]x509
Yu-Ting Chen113 visualizações
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec por Sylvain Maret
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Sylvain Maret1.1K visualizações
#MoreCrypto : Introduction to TLS por Olle E Johansson
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
Olle E Johansson1.5K visualizações
Introduction of an SSL Certificate por CheapSSLUSA
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
CheapSSLUSA280 visualizações
Web security por Muhammad Usman
Web securityWeb security
Web security
Muhammad Usman734 visualizações
All you need to know about transport layer security por Maarten Smeets
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
Maarten Smeets454 visualizações
020618 Why Do we Need HTTPS por Jackio Kwok
020618 Why Do we Need HTTPS020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPS
Jackio Kwok396 visualizações
15 intro to ssl certificate & pki concept por Mostafa El Lathy
15 intro to ssl certificate & pki concept15 intro to ssl certificate & pki concept
15 intro to ssl certificate & pki concept
Mostafa El Lathy296 visualizações
PKI and Applications por Svetlin Nakov
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov5.5K visualizações

Mais de Stephane Potier

Create your own OPC UA information model por
Create your own OPC UA information modelCreate your own OPC UA information model
Create your own OPC UA information modelStephane Potier
1.5K visualizações15 slides
OPC UA - Information Models & Companion Specifications por
OPC UA - Information Models & Companion SpecificationsOPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion SpecificationsStephane Potier
1.9K visualizações27 slides
Emballage 4.0 : vers l'excellence opérationnelle por
Emballage 4.0 : vers l'excellence opérationnelleEmballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelleStephane Potier
636 visualizações20 slides
Industry 4.0 - Enabling operational excellence of packaging lines por
Industry 4.0 - Enabling operational excellence of packaging linesIndustry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging linesStephane Potier
2K visualizações20 slides
Open standards - Key to success for Industry 4.0 por
Open standards - Key to success for Industry 4.0Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0Stephane Potier
11.1K visualizações33 slides
Industrial Ethernet Facts - The 5 major technologies por
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesStephane Potier
3.2K visualizações40 slides

Mais de Stephane Potier(7)

Create your own OPC UA information model por Stephane Potier
Create your own OPC UA information modelCreate your own OPC UA information model
Create your own OPC UA information model
Stephane Potier1.5K visualizações
OPC UA - Information Models & Companion Specifications por Stephane Potier
OPC UA - Information Models & Companion SpecificationsOPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion Specifications
Stephane Potier1.9K visualizações
Emballage 4.0 : vers l'excellence opérationnelle por Stephane Potier
Emballage 4.0 : vers l'excellence opérationnelleEmballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelle
Stephane Potier636 visualizações
Industry 4.0 - Enabling operational excellence of packaging lines por Stephane Potier
Industry 4.0 - Enabling operational excellence of packaging linesIndustry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging lines
Stephane Potier2K visualizações
Open standards - Key to success for Industry 4.0 por Stephane Potier
Open standards - Key to success for Industry 4.0Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0
Stephane Potier11.1K visualizações
Industrial Ethernet Facts - The 5 major technologies por Stephane Potier
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
Stephane Potier3.2K visualizações
Safety versus security por Stephane Potier
Safety versus securitySafety versus security
Safety versus security
Stephane Potier8.6K visualizações

Último

ChatGPT and AI for Web Developers por
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web DevelopersMaximiliano Firtman
187 visualizações82 slides
handbook for web 3 adoption.pdf por
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
22 visualizações16 slides
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
33 visualizações69 slides
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! por
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!sammart93
9 visualizações39 slides
Web Dev - 1 PPT.pdf por
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdfgdsczhcet
60 visualizações45 slides
Melek BEN MAHMOUD.pdf por
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdfMelekBenMahmoud
14 visualizações1 slide

Último(20)

ChatGPT and AI for Web Developers por Maximiliano Firtman
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman187 visualizações
handbook for web 3 adoption.pdf por Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker33 visualizações
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! por sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 visualizações
Web Dev - 1 PPT.pdf por gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet60 visualizações
Melek BEN MAHMOUD.pdf por MelekBenMahmoud
Melek BEN MAHMOUD.pdfMelek BEN MAHMOUD.pdf
Melek BEN MAHMOUD.pdf
MelekBenMahmoud14 visualizações
Report 2030 Digital Decade por Massimo Talia
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
Massimo Talia15 visualizações
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10237 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil298 visualizações
Black and White Modern Science Presentation.pptx por maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291616 visualizações
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
IttrainingIttraining41 visualizações
Piloting & Scaling Successfully With Microsoft Viva por Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge12 visualizações
Java Platform Approach 1.0 - Picnic Meetup por Rick Ossendrijver
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver27 visualizações
Transcript: The Details of Description Techniques tips and tangents on altern... por BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada135 visualizações
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson66 visualizações
Empathic Computing: Delivering the Potential of the Metaverse por Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 visualizações
Info Session November 2023.pdf por AleksandraKoprivica4
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdf
AleksandraKoprivica411 visualizações
Tunable Laser (1).pptx por Hajira Mahmood
Tunable Laser (1).pptxTunable Laser (1).pptx
Tunable Laser (1).pptx
Hajira Mahmood24 visualizações
DALI Basics Course 2023 por Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg16 visualizações

An introduction to X.509 certificates

  • 1. An introduction to X.509 certificates Stéphane Potier stephane.potier [at] br-automation.com
  • 2. Basics of cryptography Symmetric cryptography Private/Public-key algorithms Secure Hash Function Digital Signature
  • 3. Symmetric cryptography Symmetric cryptography (e.g. AES) is used for data encryption A secret ciphering key is used for both encryption and decryption (128 or 256 bits recommended) The secret ciphering key must be known by both client and server, it must be exchanged in a secure way between them Based on secret ciphering key
  • 4. Public and Private Key pair The Public and Private Key pair comprise of two uniquely mathematically related cryptographic keys • A public key is made available to everyone • A private key is confidential to its owner Whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa Public and Private Key pair is used by : • Asymmetrical cryptography, for confidentiality • Digital signature, for authentication Unpredictable large random numbers
  • 5. Asymmetrical cryptography Public-key cryptography is a class of cryptographic protocols based on algorithms that require Public and Private Key pair • Public Key may be disseminated widely, Private Key is secret and only known by the owner • The Public Key is used to encrypt the message, the Private Key to decrypt it • For example, Bob uses the Public Key of Alice to encrypt a message. Alice is the only one that can decrypt the message. The message remains confidential to anyone else since they do not know Alice’s Private Key. Public-key algorithm
  • 6. Secure Hash Algorithm (SHA) Hash functions are used to map data of arbitrary size to data of fixed size In cryptography, hash function produce a checksum (hash value) used to verify data integrity A cryptographic hash function has following characteristics: • Minor change in the input data completely change the hash value • Easy verification that some input data maps to a given hash value • Difficulty to reconstruct input data from hash value SHA (Secure Hash Algorithm) is a famous cryptographic hash function • SHA0 is obsolete • SHA1 is deprecated since 31/12/2016 • SHA2 is currently recommended • SHA3 are newest version Integrity of data
  • 7. Digital signature Digital signature ensure authentication and integrity of data • Asymmetric cryptography used for data authentication • Cryptographic hash function used for data integrity Authentication and integrity of data
  • 8. Combining symmetric and asymmetric algorithms Symmetric cryptography • Fast encryption requiring less processing power • Secure exchange of ciphering key is necessary Asymmetric cryptography • Slow encryption method based on long keys (2048 bits) • Requires public key infrastructure Exchange of session key between Bob and Alice via asymmetric cryptography , then symmetric cryptography based on this session key Session key exchange
  • 10. X.509 certificate A digital certificate certifies the ownership of a public key by the named subject of the certificate The digital certificate itself is protected by a digital signature whose authenticity can be verified by the public key of the Certification Authority (CA) that issued the certificate Ensuring authenticity and integrity
  • 11. Certification Authority (CA) Certification Authority (CA) issues certificates Certificate is signed with the private key of the CA CA’s private key must be very private, it is the basis of all trust for issued certificates Trusted third party issuing certificates
  • 12. Obtaining digital certificate A certificate signing request (CSR) is sent from an applicant to a certificate authority in order to apply for a digital identity certificate Certificate signing request
  • 13. Verifying digital certificate Authentication and Integrity of a certificate is verified using the Public Key of the Certification Authority that issued that certificate Authentication and Integrity check
  • 14. Certification path Chain of trust • A certificate contains its issuer (CA that signed it) • The issuer’s certificate also contains its issuer (CA that signed issuer’s certificate) • This chain of certificates is called a certification path Digital certificates are verified using a chain of trust
  • 15. Root certificate A root certificate is the top-most certificate of the certification path A root certificate is issued by a trusted certificate authority (CA), which self-sign it The root certificate is usually made trustworthy by secure physical distribution (distributed with operating system) Top-most certificate of the certification path Self-signed
  • 16. Verification of digital certificates 1. Client (i.e. web browser) initiate a TLS handshake with Amazon website, and gets certificates for both Amazon and Symantec 2. Client verifies Amazon’s certificate using Symantec’s Public Key contained in Symantec’s certificate 3. Client verifies Symantec’s certificate using VeriSign’s Public Key contained in VeriSign’s certificate (VeriSign’s certificate is a root certificate locally stored on the client by the operating system) Digital certificates are verified using a chain of trust
  • 17. Self-signed certificate A self-signed certificate : • Is signed by issuer to identify itself • Is signed by issuer with its own private key • Has no Certificate Authority The benefits: • Self-signed certificates are free of charge (unlike CA issued certificates) The risks : • Self-signed certificates are not issued by a trusted certificate authority (1) • Since client can not trust this self-signed certificate, it will raise a warning • Users must avoid being “trained” to bypass warnings or add exceptions → An entity accepting a self-signed certificate must follow similar trusting process than the addition of a new CA certificate (1) Excepted for root certificates that are self-signed and issued by trusted certification authority Risks and benefits
  • 18. X.509 certificate encodings and file extensions DER vs. CRT vs. CER vs. PEM Certificate encodings Encoding type PEM (Privacy Enhanced Mail) Base64 ASCII encoding DER (Distinguished Encoding Rules) Binary encoding Certificate file extension Encoding type .cer PEM or DER .crt PEM or DER .der DER .pem PEM DER encoded, .cer file extension, certificate PEM encoded, .pem file extension, certificate
  • 19. Certificate store A certificate store is used to store and manage digital certificates Certificate store usually contains : • Own private keys • Own certificates • Trusted 3rd party certificates • Revocation list (certificates revoked by the issuing CA before their scheduled expiration date and should no longer be trusted) Most well-known root certificates are usually stored in the certificate store It is possible to add a root (signed by CA) certificate or a self-signed certificate in the certificate store Only add a trusted certificate in the certificate store !!! Storage of digital certificates
  • 20. Expired certificate Every certificate has an expiry date, meaning the time and date past which the certificate is no longer valid The client determines what happens once certificate expires on a server • The client can not connect to the server • A warning is raised to indicate certificate has expired • … Before current certificate expires, a new certificate must be installed in the server Validity date expiry