Apple Mac (27)
DH Keys (39)
DSA Keys (70)
EC Keys (976)
Google Chrome (25)
Intermediate CA (152)
Java VM (29)
JDK Keytool (28)
Microsoft CertUtil (29)
Microsoft Edge (9)
Mozilla CertUtil (21)
Revoked Certificates (16)
Root CA (85)
RSA Keys (2660)
What Is (22)
What Is the Usage of Certificates
What is the usage of certificates? Can certificates be used for authentication, privacy protection, encryption, and digital signature?
Certificates can be used for:
These services can be important to the security of your communications. In addition, many applications use certificates, such as e-mail applications and Web browsers.
Authentication: Authentication is crucial in making communication more secure. Users must be able to prove their identity to those with whom they communicate and must be able to verify the identity of others. Authentication of identity on a network is complex because the communicating parties do not physically meet as they communicate. This can allow an unethical person to intercept messages or to impersonate another person or entity.
Privacy: Whenever sensitive information is transmitted between computing devices on any type of network, users should generally use some sort of encryption to keep their data private.
Encryption: Encryption can be thought of as locking something valuable into a strong box with a key. Conversely, decryption can be compared to opening the box and retrieving the valuable item. On computers, sensitive data in the form of e-mail messages, files on a disk, and files being transmitted across the network can be encrypted using a key. Encrypted data and the key used to encrypt data are both unintelligible.
Digital signatures: A digital signature is a way to ensure the integrity and origin of data. A digital signature provides strong evidence that the data has not been altered since it was signed and it confirms the identity of the person or entity who signed the data. This enables the important security features of integrity and nonrepudiation, which are essential for secure electronic commerce transactions.
Digital signatures are typically used when data is distributed in plaintext, or unencrypted form. In these cases, while the sensitivity of the message itself might not warrant encryption, there could be a compelling reason to ensure that the data is in its original form and has not been sent by an impostor because, in a distributed computing environment, plaintext can conceivably be read or altered by anyone on the network with the proper access, whether authorized or not.
⇒ What Is the Digital Signature on a Certificate
⇑ Terminologies on Basic Concepts
2012-07-13, 5298👍, 0💬
How to import a root CA certificate into Google Chrome? I delete it from earlier, but I have a copy ...
Certificate summary - Owner: VeriSign Class 3 Public Primary Certification Authority - G5, "(c) 2006...
After signing for the Root and Intermediate CA. when i try to sign a server_cert the following error...
Certificate summary - Owner: GeoTrust Primary Certification Authority, GeoTrust Inc., US Issuer: Equ...
What is ASN.1 IA5STRING field type? How to specify IA5STRING field type in OpenSSL "asn1parse" comma...