SlideShare a Scribd company logo
PKI and OpenSSL
All about Digital Certification Processes
Tony Fabeen
@tonyfabeen
Who am i
Pki and OpenSSL
Minimal Security for Systems
Confidentiality
Integrity
Access Control
Authentication
etc.
Internet Security
HTTPS
HTTPS ?
Secure
SSL
Secure Sockets Layer
TLS
Transport Layer Security
Pki and OpenSSL
SSL mechanisms
Criptography
Hashing
Digital Signing
Cryptography
Symmetric Key Encryption
or Secret Key Crypto System
Asymmetric Key Encryption
Pki and OpenSSL
Pki and OpenSSL
Hashing
Pki and OpenSSL
Digital Signing
Pki and OpenSSL
What is PKI ?
PKI (Public Key Infrastructure)
Is a structure responsible to
authenticate, identify Users and
Services ensuring that information
exchanged between them will not be
revealed to untrusted ones.
Not just technical stuff.
It's a set of :
People
Standards
Procedures
Hardware
Software
Used on Digital Certificates Management.
Who manages ?
Certificate Authority
(CA)
Certificate Autority (CA)
Create
Distribute
Use
Store
Revoke
PKI Brazil
ICP - Brasil
ICP Brasil Hierarchy
ICP Brasil Hierarchy
Certificates
Main reason for PKI.
Contains information wich associate
a Certificate owner to its Public Key
Pki and OpenSSL
Cross Certification
Certificate
Revogation List
(CRL)
Solutions Supported by PKI
SSL Connections
Smartcards
How To ?
OpenSSL
Open Source SSL/TLS
implementation
BSD
Linux
OpenVMS
Solaris
Windows
Programming Languages
support
C
C++
Ruby
PHP
NodeJS
etc.
OpenSSL
commands
Create a CA Request
$ openssl req -new 
> -config etc/devinsampa-ca.conf 
> -out ca/devinsampa-ca.csr 
> -keyout ca/devinsampa-ca/private/devinsampa-ca.key
Create a CA Certificate
$ openssl ca -selfsign 
> -config etc/devinsampa-ca.conf 
> -in ca/devinsampa-ca.csr 
> -out ca/devinsampa-ca.crt 
> -extensions devinsampa_ca_ext
Create a new Request
$ openssl req -new 
> -config etc/email.conf 
> -out certs/tony.csr 
> -keyout certs/tony.key
Create an e-mail certificate
$ openssl ca 
> -config etc/devinsampa-ca.conf 
> -in certs/tony.csr 
> -out certs/tony.crt 
> -extensions email_ext
Revoke Certificate
$ openssl ca 
> -config etc/devinsampa-ca.conf 
> -revoke ca/devinsampa-ca/01.pem 
> -crl_reason superseded
Create CRL
$ openssl ca -gencrl 
> -config etc/devinsampa-ca.conf 
> -out crl/devinsampa-ca.crl
Output Formats
Create DER Certificate
$ openssl x509 
> -in certs/tony.crt 
> -out certs/tony.cer 
> -outform der
Create DER CRL
$opensslcrl
> -incrl/devinsampa-ca.crl
> -outcrl/devinsampa-ca.crl
> -outformder
References
http://openssl.org/docs/apps/req.html
http://openssl.org/docs/apps/ca.html
http://openssl.org/docs/apps/x509.html
http://openssl.org/docs/apps/crl.html
http://www.iti.gov.br/
Questions
Thanks !
@tonyfabeen
tony.fabeen@gmail.com

More Related Content

PDF
Public key Infrastructure (PKI)
PPT
PKI and Applications
PPTX
Introduction to Public Key Infrastructure
PPT
Introduction To PKI Technology
PPTX
Digital certificates
PPTX
What is Asymmetric Encryption? Understand with Simple Examples
PPTX
HTTPS
PPT
13 asymmetric key cryptography
Public key Infrastructure (PKI)
PKI and Applications
Introduction to Public Key Infrastructure
Introduction To PKI Technology
Digital certificates
What is Asymmetric Encryption? Understand with Simple Examples
HTTPS
13 asymmetric key cryptography

What's hot (20)

ODP
OAuth2 - Introduction
PPTX
Pentesting ReST API
PDF
7 palo alto security zones & interfaces concepts
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Implementing Public-Key-Infrastructures
PDF
OpenID Connect Explained
PPT
Cloud presentation
PPS
Security testing
PPTX
Web Application Penetration Testing Introduction
PPT
Introduction to Web Application Penetration Testing
PPTX
OAuth 2
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
PPTX
Cryptography
PDF
Ceh v5 module 03 scanning
PDF
[OPD 2019] Attacking JWT tokens
PPTX
OpenId Connect Protocol
PPT
RADIUS
PDF
Unidad 5 - Criptografía
PDF
Security for oauth 2.0 - @topavankumarj
PDF
Hyperledger Indy tutorial
OAuth2 - Introduction
Pentesting ReST API
7 palo alto security zones & interfaces concepts
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Implementing Public-Key-Infrastructures
OpenID Connect Explained
Cloud presentation
Security testing
Web Application Penetration Testing Introduction
Introduction to Web Application Penetration Testing
OAuth 2
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Cryptography
Ceh v5 module 03 scanning
[OPD 2019] Attacking JWT tokens
OpenId Connect Protocol
RADIUS
Unidad 5 - Criptografía
Security for oauth 2.0 - @topavankumarj
Hyperledger Indy tutorial
Ad

Viewers also liked (20)

PDF
Crypto With OpenSSL
PDF
OpenSSL Basic Function Call Flow
PPT
Information Security Lesson 9 - Keys - Eric Vanderburg
PPTX
Cryptography and PKI
PDF
Enhancing System Security Using PKI
PDF
OpenSSL programming (still somewhat initial version)
PDF
PKI in Korea
PPTX
AssureBridge - SSO to Many B2B Service Providers - Marketing presentation
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PPTX
Tutorial membuat Public Key Infrastructure
PPTX
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
PPTX
A CONTEMPLATION OF OPENIG DEEP THOUGHTS
PPTX
Engineering Cryptographic Applications: Symmetric Encryption
PPTX
Securing Access Through a Multi-Purpose Credential and Digital ID
PPTX
Webinar: OpenAM 12.0 - New Featurs
PPTX
OpenIDM: An Introduction
PPTX
Identity Manager Opensource OpenIDM Architecture
PPT
Information Security Management Systems(ISMS) By Dr Wafula
PPTX
CIS 2015 Mobile SSO
PPTX
OpenDJ - An Introduction
Crypto With OpenSSL
OpenSSL Basic Function Call Flow
Information Security Lesson 9 - Keys - Eric Vanderburg
Cryptography and PKI
Enhancing System Security Using PKI
OpenSSL programming (still somewhat initial version)
PKI in Korea
AssureBridge - SSO to Many B2B Service Providers - Marketing presentation
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
Tutorial membuat Public Key Infrastructure
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
A CONTEMPLATION OF OPENIG DEEP THOUGHTS
Engineering Cryptographic Applications: Symmetric Encryption
Securing Access Through a Multi-Purpose Credential and Digital ID
Webinar: OpenAM 12.0 - New Featurs
OpenIDM: An Introduction
Identity Manager Opensource OpenIDM Architecture
Information Security Management Systems(ISMS) By Dr Wafula
CIS 2015 Mobile SSO
OpenDJ - An Introduction
Ad

Similar to Pki and OpenSSL (20)

PDF
15 intro to ssl certificate & pki concept
PDF
PDF
5.[29 38]a practical approach for implementation of public key infrastructure...
PDF
5.[29 38]a practical approach for implementation of public key infrastructure...
PDF
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
PDF
PKI Industry growth in Bangladesh
PDF
Why do you need PKI Box?
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PDF
PUBLIC KEY INFRASTRUCTURE Network and network devices
PPT
Public Key Infrastructure and Application_Applications.ppt
PPTX
PKI-Architecture-Securing-the-Digital-World.pptx
PDF
Reconsidering PKI and its Place in Your Enterprise Encryption Strategy
PPTX
PKI & SSL
PPT
المحاضرة_التاسعة_المفتاح العام هيكلية_PKI.ppt
PPT
PKI_Applications digital certificate.ppt
PDF
Everything you need to Know about PKI .pdf
PDF
150819_oml_pki_v1p
PDF
150819_oml_pki_v1p
PDF
Iaetsd secure emails an integrity assured email
PPTX
pki.pptx
15 intro to ssl certificate & pki concept
5.[29 38]a practical approach for implementation of public key infrastructure...
5.[29 38]a practical approach for implementation of public key infrastructure...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
PKI Industry growth in Bangladesh
Why do you need PKI Box?
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PUBLIC KEY INFRASTRUCTURE Network and network devices
Public Key Infrastructure and Application_Applications.ppt
PKI-Architecture-Securing-the-Digital-World.pptx
Reconsidering PKI and its Place in Your Enterprise Encryption Strategy
PKI & SSL
المحاضرة_التاسعة_المفتاح العام هيكلية_PKI.ppt
PKI_Applications digital certificate.ppt
Everything you need to Know about PKI .pdf
150819_oml_pki_v1p
150819_oml_pki_v1p
Iaetsd secure emails an integrity assured email
pki.pptx

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
KodekX | Application Modernization Development
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Cloud computing and distributed systems.
Digital-Transformation-Roadmap-for-Companies.pptx
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KodekX | Application Modernization Development
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...

Pki and OpenSSL