SlideShare a Scribd company logo
5
Most read
6
Most read
11
Most read
Digital Certificates
(PKI)
1
Cryptography History
• Cryptography is the art of encrypting and decrypting information
• The earliest known use of cryptography was the Egyptians in
1900BC
• Julius Ceaser use a simple substituion cipher to secure his
communications
• Thomas Jefferson, in 1790, invented a cipher wheel that the US Navy
used in WWII
• In the late 20s and early 30s, the FBI established an office to combat
the increasing use of cryptography by criminals (rum runners)
• Dr. Hosrt Feistel invented the precusor to DES while at IBM
• In 1976, the Federal Govt introduced DES based on using Feistel
ciphers
• In 1977, Scientific American magazine introduced us to Rivest,
Shamir and
• Aldeman or RSA encryption. They offered it for free with a self
addressed
• envelope and the NSA promptly freaked out
• 1990 brought us the 128 bit cipher called “IDEA”
• X.500 was the orginal protocol in 1988
• X.509 V3 was released in 1996
2
(X.509 digital certificates)what
for
● 802.1x port authentication
● Digital Signatures
● File Encryption
● Web Authorization (SSL)
● IP Security (end-point to end-point)
● Secure Email
● VPNs
3
Digital Certificate
Electronic Certificate it contains
information about an individual or entity. It
Is issued from a trusted 3rd party.
Contains information that can prove its
authenticity. Has an expiration date.It Is
presented to someone (or some thing) for
validation. (Ex. driver’s license or
passport)
4
Introduction to Public Key
Infrastructure (PKI)
PKI is a security architecture that
has been introduced to provide an
increased level of confidence for
exchanging information over an
increasingly insecure Internet.
Public |<>| Private
5
The Public Key used for
Encryption
Another person uses your public encryption
key when they want to send you
confidential information. The information to
be sent is encrypted using your public
key*. You can provide your public key to
the sender, or it can be retrieved from the
directory in which it is published.
6
The Private Key used for
Decryption
A private key is used to decrypt information
that has been encrypted using its
corresponding public key. The person
using the private key can be certain that
the information it is able to decrypt must
have been intended for them, but they
cannot be certain who the information is
from.
7
Plain
text
Encrypt with
B’s public
key
Plain text
Decrypt with
B’s private key
Sender
(A)
Netwo
rk
Receiver
(B)
Cipher
text
Cipher
text
8
Customer
A
Customer
B
Customer
C
Bank’s public
key
Bank’s public
key
Bank’s public
key
Bank’s private
key
Bank
9
C1(S1)
C4(S4)
C2(S2) C3(S3)
S1 S2
S3 S4
Certificate Servers
Certificate
Generator
10
Certification Authority (CA)
It Is a combination of hardware and software
which is responsible for creating digital
certificates
It can issue certificates to individuals,
organizations, network devices, servers, or
other CAs
11
Support for
Windows / Linux
• Outlook
• Lotus Notes
• Netscape / Mozilla
• Thunderbird
12
PKI (Public Key Infrastructure)
-Infrastructure using pairs of public and private
keys to ensure privacy and security of data.
Private Key
-One half of the PKI key pair and which is never
given out to anyone. This key can be protected
by a password.
Public Key
-The second half of the PKI key pair that can be
given out to the public or placed on a key server.
CA (Certificate Authority) (Ex. DNS)
-A trusted authority that signs your certificates
and validates the certificate.
Terminology
13
Self Signed Certificate
– A digital certificate that you signed and validated using a private CA
and is not trusted by default in the real world.
SSL (Secure Socket Layer)
– A protocol developed by Netscape to provide a secure method of
exchanging data using a browser over a public network such as the
internet.
Hash
-Hashing is taking a file and applying a hashing algorithm to it and
generating a mathematical checksum.
RSA (Rivest, Shamir and Aldeman)
– A public key cipher that can be used to encrypt and to digitally sign.
DSA (Digital Signing Algorithm)
– Like RSA, it is a public key cipher but it can only be used to digitally
sign.
PKCS#12 (Personal Information Exchange Syntax)
– A portable container file format that can be used to transfer
certificates and private keys.
Terminology
14
algorithm
MD5
– Message Digest 5. Hash algorithm that was
released in 1991.
SHA1
– Secure Hash Algorithm version 1 ciper was
released in 1995.
There are improved versions of SHA
collectively called “SHA2”
15

More Related Content

PPT
6. cryptography
PPT
Digital Certificate
PPTX
Kerberos
PPT
Digital certificates
PPTX
Introduction to Public Key Infrastructure
PPTX
Cryptography
PPTX
Cryptography
PPTX
Cryptography.ppt
6. cryptography
Digital Certificate
Kerberos
Digital certificates
Introduction to Public Key Infrastructure
Cryptography
Cryptography
Cryptography.ppt

What's hot (20)

PDF
Digital certificates &amp; its importance
PPTX
Cryptography and Information Security
PPT
Introduction To PKI Technology
PPTX
public key infrastructure
PDF
Electronic mail security
PDF
Public key Infrastructure (PKI)
PPTX
PPTX
Digital signature(Cryptography)
PPTX
Cryptography
PPT
Introduction to Digital signatures
PPT
Digital Signature
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
x.509-Directory Authentication Service
PPTX
cryptography
PPTX
Cryptography
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PPT
Cryptography
PPTX
Public Key Cryptography
PPTX
RSA ALGORITHM
PPTX
Public key infrastructure
Digital certificates &amp; its importance
Cryptography and Information Security
Introduction To PKI Technology
public key infrastructure
Electronic mail security
Public key Infrastructure (PKI)
Digital signature(Cryptography)
Cryptography
Introduction to Digital signatures
Digital Signature
CRYPTOGRAPHY AND NETWORK SECURITY
x.509-Directory Authentication Service
cryptography
Cryptography
Block Cipher Modes of Operation And Cmac For Authentication
Cryptography
Public Key Cryptography
RSA ALGORITHM
Public key infrastructure
Ad

Viewers also liked (18)

PPTX
Digital certificates and information security
PPT
Digital Signature
PDF
Digital signatures
PPT
Digital signature
PPTX
Seminar ppt on digital signature
PPTX
Basic concept of pki
PPTX
Pki for dummies
PPT
PPTX
Digital signature & certificate
PDF
Understanding Digital Certificates & Secure Sockets Layer
PPTX
Kerberos
PPTX
Kerberos
PPTX
Firewall presentation
PPT
Intrusion detection system ppt
PPTX
Introduction of firewall slides
PPT
Cryptography & Digital certificate
PPTX
Kumkum digital certificate
PDF
PKI in Korea
Digital certificates and information security
Digital Signature
Digital signatures
Digital signature
Seminar ppt on digital signature
Basic concept of pki
Pki for dummies
Digital signature & certificate
Understanding Digital Certificates & Secure Sockets Layer
Kerberos
Kerberos
Firewall presentation
Intrusion detection system ppt
Introduction of firewall slides
Cryptography & Digital certificate
Kumkum digital certificate
PKI in Korea
Ad

Similar to Digital certificates (20)

PDF
Secure 3 kany-vanda
PPT
PKI_Applications digital certificate.ppt
PPT
Public Key Infrastructure and Application_Applications.ppt
PPT
PKI and Applications
PPT
PDF
computer-security-and-cryptography-a-simple-presentation
PPT
Cryptography
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PPT
NS Unit 3 AAR.ppt
PPT
Java Crypto
PPTX
Cryptographic Tools Week#11 Lecture #01,02.pptx
PDF
s117
PPT
Introduction to distributed security concepts and public key infrastructure m...
PPTX
Encryption in Cryptography
PPT
29th_Nov-Public_Key_Infrastructure-tell_me_in_plain_English_AND_THEN_deep_tec...
PDF
Pki 201 Key Management
PPT
Chapter 08
PPT
Cryptography
Secure 3 kany-vanda
PKI_Applications digital certificate.ppt
Public Key Infrastructure and Application_Applications.ppt
PKI and Applications
computer-security-and-cryptography-a-simple-presentation
Cryptography
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
NS Unit 3 AAR.ppt
Java Crypto
Cryptographic Tools Week#11 Lecture #01,02.pptx
s117
Introduction to distributed security concepts and public key infrastructure m...
Encryption in Cryptography
29th_Nov-Public_Key_Infrastructure-tell_me_in_plain_English_AND_THEN_deep_tec...
Pki 201 Key Management
Chapter 08
Cryptography

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Monthly Chronicles - July 2025
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Digital certificates

  • 2. Cryptography History • Cryptography is the art of encrypting and decrypting information • The earliest known use of cryptography was the Egyptians in 1900BC • Julius Ceaser use a simple substituion cipher to secure his communications • Thomas Jefferson, in 1790, invented a cipher wheel that the US Navy used in WWII • In the late 20s and early 30s, the FBI established an office to combat the increasing use of cryptography by criminals (rum runners) • Dr. Hosrt Feistel invented the precusor to DES while at IBM • In 1976, the Federal Govt introduced DES based on using Feistel ciphers • In 1977, Scientific American magazine introduced us to Rivest, Shamir and • Aldeman or RSA encryption. They offered it for free with a self addressed • envelope and the NSA promptly freaked out • 1990 brought us the 128 bit cipher called “IDEA” • X.500 was the orginal protocol in 1988 • X.509 V3 was released in 1996 2
  • 3. (X.509 digital certificates)what for ● 802.1x port authentication ● Digital Signatures ● File Encryption ● Web Authorization (SSL) ● IP Security (end-point to end-point) ● Secure Email ● VPNs 3
  • 4. Digital Certificate Electronic Certificate it contains information about an individual or entity. It Is issued from a trusted 3rd party. Contains information that can prove its authenticity. Has an expiration date.It Is presented to someone (or some thing) for validation. (Ex. driver’s license or passport) 4
  • 5. Introduction to Public Key Infrastructure (PKI) PKI is a security architecture that has been introduced to provide an increased level of confidence for exchanging information over an increasingly insecure Internet. Public |<>| Private 5
  • 6. The Public Key used for Encryption Another person uses your public encryption key when they want to send you confidential information. The information to be sent is encrypted using your public key*. You can provide your public key to the sender, or it can be retrieved from the directory in which it is published. 6
  • 7. The Private Key used for Decryption A private key is used to decrypt information that has been encrypted using its corresponding public key. The person using the private key can be certain that the information it is able to decrypt must have been intended for them, but they cannot be certain who the information is from. 7
  • 8. Plain text Encrypt with B’s public key Plain text Decrypt with B’s private key Sender (A) Netwo rk Receiver (B) Cipher text Cipher text 8
  • 10. C1(S1) C4(S4) C2(S2) C3(S3) S1 S2 S3 S4 Certificate Servers Certificate Generator 10
  • 11. Certification Authority (CA) It Is a combination of hardware and software which is responsible for creating digital certificates It can issue certificates to individuals, organizations, network devices, servers, or other CAs 11
  • 12. Support for Windows / Linux • Outlook • Lotus Notes • Netscape / Mozilla • Thunderbird 12
  • 13. PKI (Public Key Infrastructure) -Infrastructure using pairs of public and private keys to ensure privacy and security of data. Private Key -One half of the PKI key pair and which is never given out to anyone. This key can be protected by a password. Public Key -The second half of the PKI key pair that can be given out to the public or placed on a key server. CA (Certificate Authority) (Ex. DNS) -A trusted authority that signs your certificates and validates the certificate. Terminology 13
  • 14. Self Signed Certificate – A digital certificate that you signed and validated using a private CA and is not trusted by default in the real world. SSL (Secure Socket Layer) – A protocol developed by Netscape to provide a secure method of exchanging data using a browser over a public network such as the internet. Hash -Hashing is taking a file and applying a hashing algorithm to it and generating a mathematical checksum. RSA (Rivest, Shamir and Aldeman) – A public key cipher that can be used to encrypt and to digitally sign. DSA (Digital Signing Algorithm) – Like RSA, it is a public key cipher but it can only be used to digitally sign. PKCS#12 (Personal Information Exchange Syntax) – A portable container file format that can be used to transfer certificates and private keys. Terminology 14
  • 15. algorithm MD5 – Message Digest 5. Hash algorithm that was released in 1991. SHA1 – Secure Hash Algorithm version 1 ciper was released in 1995. There are improved versions of SHA collectively called “SHA2” 15