SlideShare a Scribd company logo
 
An attachment to an electronic message used for security purposes.
The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply .
An individual wishing to send an encrypted message applies for a digital certificate from a  Certificate Authority.  The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print   publicity or perhaps on the Internet.
The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply.
The most widely used standard for digital certificates is  X.509
Sumant Kr. Diwakar

More Related Content

PPTX
Digital certificates and information security
PPT
DIGITAL SIGNATURE
PPTX
Digital certificates
PPT
Digital certificates
PPT
Digital Signature
PPTX
Digital signature & certificate
PPT
Digital signature
PPT
X.509 Certificates
Digital certificates and information security
DIGITAL SIGNATURE
Digital certificates
Digital certificates
Digital Signature
Digital signature & certificate
Digital signature
X.509 Certificates

What's hot (20)

PPT
Presentation on digital signatures & digital certificates
PPTX
Digital signature
PPT
PKI and Applications
PPTX
public key infrastructure
PPT
Pretty good privacy
PPTX
PPTX
Digital signature
PPT
Digital signature
DOC
Certification authority
PPT
Cryptography
PPTX
Public key infrastructure
PDF
Public key Infrastructure (PKI)
PPTX
Passwordless auth
DOCX
Цифровият подпис-теория и практика
PPT
Information Security & Cryptography
PPT
Cryptography
PPSX
Secure socket layer
PDF
Digital signatures
PPT
Authentication Application in Network Security NS4
PPT
Elgamal Digital Signature
Presentation on digital signatures & digital certificates
Digital signature
PKI and Applications
public key infrastructure
Pretty good privacy
Digital signature
Digital signature
Certification authority
Cryptography
Public key infrastructure
Public key Infrastructure (PKI)
Passwordless auth
Цифровият подпис-теория и практика
Information Security & Cryptography
Cryptography
Secure socket layer
Digital signatures
Authentication Application in Network Security NS4
Elgamal Digital Signature
Ad

Viewers also liked (20)

PDF
E tutorial - digital signature
PPT
Introduction to Digital signatures
PPT
Digital certificate & signature
PPT
Digital signature
PPT
PPTX
Firewall presentation
PPTX
Introduction of firewall slides
PPT
National Certificate Digital Media Computing
PPT
Cryptography & Digital certificate
PPTX
Impact of digital certificate in network security
PDF
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
PDF
SSL, X.509, HTTPS - How to configure your HTTPS server
PDF
SSLCertificate101
PPTX
Kumkum digital certificate
PPTX
Digital certificates
PDF
PDF
Understanding Digital Certificates & Secure Sockets Layer
PPT
TCP IP
E tutorial - digital signature
Introduction to Digital signatures
Digital certificate & signature
Digital signature
Firewall presentation
Introduction of firewall slides
National Certificate Digital Media Computing
Cryptography & Digital certificate
Impact of digital certificate in network security
EuSecWest 2008 - Abusing X509 Certificate Features (Alexander Klink, Cynops G...
SSL, X.509, HTTPS - How to configure your HTTPS server
SSLCertificate101
Kumkum digital certificate
Digital certificates
Understanding Digital Certificates & Secure Sockets Layer
TCP IP
Ad

Similar to Digital Certificate (20)

PPTX
Digital signature
PPT
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
PPT
Pki & personal digital certificates, securing sensitive electronic communicat...
PPT
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
PPT
Pki & personal digital certificates, the key to securing sensitive electronic...
PPT
Digital signature introduction
PPT
Cryptography
PPT
Cryptography
PPTX
Digital certificates
DOCX
Digital signature
PDF
The Digital Signature and the X.509/OpenPGP Authentication Models
PPT
Pki the key to securing sensitive communications
PDF
Jdbc 7
PDF
Unit 3_Digital Certificate_Intro_Types.pdf
PPTX
Digital Signature in Indian Evidence act .pptx
PPTX
Digital Signatdsbuisduifhudosffdosfure.pptx
PPTX
Digital signature and certificate authority
PDF
Digital certificates & its importance
PPTX
Digital_signature_ppt.pptx
Digital signature
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & personal digital certificates, the key to securing sensitive electronic...
Digital signature introduction
Cryptography
Cryptography
Digital certificates
Digital signature
The Digital Signature and the X.509/OpenPGP Authentication Models
Pki the key to securing sensitive communications
Jdbc 7
Unit 3_Digital Certificate_Intro_Types.pdf
Digital Signature in Indian Evidence act .pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital signature and certificate authority
Digital certificates & its importance
Digital_signature_ppt.pptx

More from Sumant Diwakar (20)

PDF
Hydrologic Assessment in a Middle Narmada Basin, India using SWAT Model
DOCX
C Programming
DOCX
C Programming
DOCX
Soil moisture
PDF
REMOTE SENSING & GIS APPLICATIONS IN WATERSHED MANAGEMENT
PDF
Relation between Ground-based Soil Moisture and Satellite Image-based NDVI
PDF
Solar irradiation & spectral signature
PDF
Optical remote sensing
PDF
Interaction of EMR with atmosphere and earth surface
PDF
History of remote sensing
PDF
Electromagnetic radiation
PPT
Map projection
PDF
Differential gps (dgps) 09 04-12
PDF
Principle of photogrammetry
PDF
Digital terrain model
PDF
Digital orthophoto
PDF
Automatic digital terrain modelling
PDF
Aerial photography abraham thomas
PDF
Aerial photographs and their interpretation
PDF
Wide field sensor
Hydrologic Assessment in a Middle Narmada Basin, India using SWAT Model
C Programming
C Programming
Soil moisture
REMOTE SENSING & GIS APPLICATIONS IN WATERSHED MANAGEMENT
Relation between Ground-based Soil Moisture and Satellite Image-based NDVI
Solar irradiation & spectral signature
Optical remote sensing
Interaction of EMR with atmosphere and earth surface
History of remote sensing
Electromagnetic radiation
Map projection
Differential gps (dgps) 09 04-12
Principle of photogrammetry
Digital terrain model
Digital orthophoto
Automatic digital terrain modelling
Aerial photography abraham thomas
Aerial photographs and their interpretation
Wide field sensor

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
Hybrid model detection and classification of lung cancer
PPT
What is a Computer? Input Devices /output devices
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
project resource management chapter-09.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
Developing a website for English-speaking practice to English as a foreign la...
O2C Customer Invoices to Receipt V15A.pptx
observCloud-Native Containerability and monitoring.pptx
Getting Started with Data Integration: FME Form 101
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
Hybrid model detection and classification of lung cancer
What is a Computer? Input Devices /output devices
Zenith AI: Advanced Artificial Intelligence
Group 1 Presentation -Planning and Decision Making .pptx
project resource management chapter-09.pdf
Tartificialntelligence_presentation.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Web App vs Mobile App What Should You Build First.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Enhancing emotion recognition model for a student engagement use case through...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf

Digital Certificate

  • 1.  
  • 2. An attachment to an electronic message used for security purposes.
  • 3. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply .
  • 4. An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority. The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet.
  • 5. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply.
  • 6. The most widely used standard for digital certificates is X.509