Download presentation
Presentation is loading. Please wait.
1
What is
2
Digital Certificate
3
It is an identity.
4
It is…
5
From webopedia An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA). The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet.attachmentsecurityencryptedCertificate Authority (CA)public keyInternet The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. From WhatIs.com A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority (CA). It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Some digital certificates conform to a standard, X.509. Digital certificates can be kept in registries so that authenticating users can look up other users' public keys.CApublic keydigital signature Definitions
6
Mess
7
An electronic
8
ID card
9
for Identify
10
To Identify
11
You
12
What can
13
represent you?
14
Verbal..
16
ID card
17
Driving License
18
Signature
19
3
20
(1)
21
Uniqueness
22
(2)
23
Related to you
24
ID card
26
(3)
27
Authorities
32
Trust Party
33
Trust
34
Authorities
35
Internet
36
You
37
Verbal..
39
MSN
43
Trust …no more
44
E-commerce
47
Who are You
48
?
49
Digital
50
ID card
51
Driving License
53
Digital Signature
54
Digital Certificate
56
End section [Background]
57
System
58
PKI
59
(Public Key Infrastructure)
60
Design
61
For identify
62
Digital Signature
63
Digital Certificate
64
How it works?
65
Sender...encrypt…send..his… signature and cert…..to server…CA confirms it.. receiver check…. the..…result…decrypt…get the message..etc.etc.etc…
66
Example
67
David
68
Juno
69
Junos Private Key
70
Lese piks S! C! lnestssos
71
Lets skip CS lessons !!
72
David
74
CA (Certificate Authority)
76
Third Trust Party
77
CK Company
78
certificate and a randomly generated data which has encrypted with his private key to the CA The CA will check the certificate with its database and use the public key to decrypt the data. The encrypted data act like a digital signature and can be thought of as evidence provided by the user. So if the certificate is true and the data is decrypted, the user then gets the authentication from the CA.
79
Old School
80
Public Private
81
However…
82
Efficiency
83
PKI
84
C 2
85
Server
87
End section [System]
88
Deeper…
89
Theory
90
1.
91
The encryption
92
What is
93
Public Private ?
94
Sorry.
95
Covered
96
End section [Theory]
97
Last Part
99
Certificate Authority
100
How to
101
Choose
102
That word again
103
Trust
104
- History
105
- Trustworthy
106
- Cost
109
End [Presentation]
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.