What are certificates?

Share this & earn $10
itfreetraining
Published at : 12 Sep 2021
684527 views
4699
146

Certificates are used to prove identity and used for creating secure communication. Check out http://itfreetraining.com for more of our always free training videos. This video looks at how a certificate works, what is a certificate and how they are used for identification and secure communication.

Download the PDF handout
http://itfreetraining.com/handouts/certificates/WhatAreCertificates.pdf

What is a certificate?
A certificate is an electronic document that contains data fields. When compared to a traditional paper certificate there are some similarities between an electronic certificate and a physical certificate. Digital certificates like a physical certificate are issued by an authority. For example, a university may issue a certificate to a student to show that they have completed the necessary work in order to graduate. The next question is, would you trust a physically certificate? Digital certificates work the same way. They are issued from an authority and the question becomes would you trust the authority that issued the certificate? Electronic certificates also contain other fields like who or what the certificate was issued to, how long it is valid, the public key and the digital signature. If a digital certificate is presented to a user or computer, the user or computer is able to check the certificate to ensure the person using it should be using it. Also the certificate contains a digital signature which allows the certificate to be checked to make sure it has not been modified.

Digital Signature
A digital signature provides a method for a certificate to be checked to ensure it has not been modified. In order to do this, a hash value is created for the certificate. To generate a hash value the certificate is put through a function to create a single value. Hash functions are designed so different certificates will not produce the same value, however the hash value cannot be used to generate the original certificate. The same principal applies to a person’s fingerprints. They can be used to identify a person, however using a finger print you could not work out the features of a person like what color hair they have. When a certificate is created, the hash value for that certificate is also created. Using a function involving the private key, a digital signature is created and added to the certificate.

Digital Signature Example
When a certificate is used, in order to check the certificate has not been changed, the following is done: The computer generates the hash value for the certificate. Next, the digital signature is put through a function using the public key which should result in the same hash value. If both values match, the certificate has not been modified. This prevents a 3rd party taking a certificate, changing the values in the certificate and using the certificate.

Trust Model
Certificates work off a trust model. An example of a trust model in computers is that a computer may have a sticker on it indicating which operating systems it will run. The consumer, seeing this sticker, must trust that the manufacture would not put this sticker on the laptop unless it will run that operating system. The customer must also trust the creator of that operating system would not allow a computer manufacturer to put a sticker on a computer that would not run that operating system.

Certificate Trust Model
Certificates are generally deployed in a hierarchy. At the top is the root certificate authority. This can be an internal Certificate Authority or an external authority like VeriSign. When an authority like VeriSign issues a certificate, they will perform a number of checks on the individual purchasing the certificate to ensure that they are a valid business. When a certificate is used it can be checked to see which authority issued that certificate. In order for the certificate to be used, the computer must trust the authority that it was issued from. Authorities like VeriSign are trusted by default on most operating systems.

Certificate Error
If a certificate is presented to the computer and it is not trusted, the computer will generate an error asking if the users want to trust the certificate. It is up to the user to decide if they believe the certificate is valid.

Certificate Hierarchy
Certificates use a hierarchy. At the top is the root CA, below these are subordinate CA’s. Any level can issue certificates to subordinate CA’s or direct to users, computers or devices. If the user, computer or device trusts the root CA, then any certificate that is issued by any CA in the hierarchy will automatically be trusted and thus used by the client.

References
"MCTS 70-640 Configuring Windows Server 2008 Active Directory Second edition" pg 771-775
"Public key certificate" http://en.wikipedia.org/wiki/Public_key_certificate

CertificatesDigital SignaturesITFreeTraining

🎵 Music for Shops, Clothing Stores, Bars, Restaurants | MOST LISTENED MUSIC 2021 🎵

🎵 Music for Shops, Clothing Stores, Bars, Restaurants | MOST LISTENED MUSIC 2021 🎵

Shakira - Whenever, Wherever (Video)

Shakira - Whenever, Wherever (Video)

CRAZIEST Doomfist tech of ALL TIME

CRAZIEST Doomfist tech of ALL TIME

Funniest Joke - Can You Actually Get Married In Heaven? The Results Will Shock You

Funniest Joke - Can You Actually Get Married In Heaven? The Results Will Shock You

Huge Twitch Leak

Huge Twitch Leak

How Visa Became The Most Popular Card In The U.S.

How Visa Became The Most Popular Card In The U.S.

Exploring a Massive Kirkbride Asylum - Amazing 19th Century Architecture

Exploring a Massive Kirkbride Asylum - Amazing 19th Century Architecture

I'm Going to Make This an Awesome Day! | Start of the Day Song for Kids | Jack Hartmann

I'm Going to Make This an Awesome Day! | Start of the Day Song for Kids | Jack Hartmann

Normally (Original Mix)

Normally (Original Mix)

FilterCopy | If Salary Were A Person | Ft. Wamiqa Gabbi and Veer Rajwant Singh

FilterCopy | If Salary Were A Person | Ft. Wamiqa Gabbi and Veer Rajwant Singh

The Great Resignation: Why Millions Of Workers Are Quitting

The Great Resignation: Why Millions Of Workers Are Quitting

Major Lazer & DJ Maphorisa - Particula (ft. Nasty C, Ice Prince, Patoranking & Jidenna)(Music Video)

Major Lazer & DJ Maphorisa - Particula (ft. Nasty C, Ice Prince, Patoranking & Jidenna)(Music Video)

Erika de Casier - Polite (Official Video)

Erika de Casier - Polite (Official Video)

It Isn't Like You

It Isn't Like You

A Few Bucks

A Few Bucks

How to Write a Research Methodology in 4 Steps | Scribbr 🎓

How to Write a Research Methodology in 4 Steps | Scribbr 🎓

What's the Most Unlikely Thing That Could Happen to You?

What's the Most Unlikely Thing That Could Happen to You?

Why The US Toll System Is So Complicated - Cheddar Explains

Why The US Toll System Is So Complicated - Cheddar Explains

Massive Attack - Angel

Massive Attack - Angel

Parcels - Lightenup (Official Music Video)

Parcels - Lightenup (Official Music Video)

Sweet potatoes! best with aromatic spices as a curry as well as a Sweet dessert | Traditional Me

Sweet potatoes! best with aromatic spices as a curry as well as a Sweet dessert | Traditional Me

Shakira - Waka Waka (This Time for Africa) (The Official 2010 FIFA World Cup™ Song)

Shakira - Waka Waka (This Time for Africa) (The Official 2010 FIFA World Cup™ Song)

Major Lazer, The Flexican, FS Green & Busy Signal - Watch Out for This (Bumaye) [Official Video]

Major Lazer, The Flexican, FS Green & Busy Signal - Watch Out for This (Bumaye) [Official Video]

I REALLY NEED YOUR HELP

I REALLY NEED YOUR HELP

What is NEAR Protocol? NEAR Explained with Animations

What is NEAR Protocol? NEAR Explained with Animations

Ariana Grande - Almost Is Never Enough ft. Nathan Sykes - Lyrics [HD]

Ariana Grande - Almost Is Never Enough ft. Nathan Sykes - Lyrics [HD]

JUST UNDER - Pretérito Imperfeito [Videoclip]

JUST UNDER - Pretérito Imperfeito [Videoclip]

Your House (Original Mix)

Your House (Original Mix)

10 Worst Wrestling Stipulations Ever | PartsFUNknown

10 Worst Wrestling Stipulations Ever | PartsFUNknown

How to Reinforce and Burglar Proof Your Entry Door

How to Reinforce and Burglar Proof Your Entry Door

one direction - strong // lyrics

one direction - strong // lyrics

Baby Keem, Kendrick Lamar - range brothers (Official Audio)

Baby Keem, Kendrick Lamar - range brothers (Official Audio)

H.E.R. Feat. H.I.M. - Me & U

H.E.R. Feat. H.I.M. - Me & U

Kylie Jenner Looked Concerned During Travis Scott's Set, Video Shows | TMZ

Kylie Jenner Looked Concerned During Travis Scott's Set, Video Shows | TMZ

thiva character ability test in free fire / new character ability - Garena Free Fire

thiva character ability test in free fire / new character ability - Garena Free Fire

Marble Run Race ASMR ☆ 4 Slope Course & Hape Wooden Big Rolling Ball

Marble Run Race ASMR ☆ 4 Slope Course & Hape Wooden Big Rolling Ball

Rich vs Broke vs Giga Rich

Rich vs Broke vs Giga Rich

Shazam Girls Toxic Summer Mix 2021 - Best Vocal Deep House Music Chill Out New Mix By MissDeep

Shazam Girls Toxic Summer Mix 2021 - Best Vocal Deep House Music Chill Out New Mix By MissDeep

"Basics in Behavior" | Baldi's Basics Animated Minecraft Music Video

"Basics in Behavior" | Baldi's Basics Animated Minecraft Music Video

I'm Called 'Fat' And 'Obese' - But I Love My Body | SHAKE MY BEAUTY

I'm Called 'Fat' And 'Obese' - But I Love My Body | SHAKE MY BEAUTY

Imply & S2E partner to redefine analytics - Italian

Imply & S2E partner to redefine analytics - Italian

Learn English Grammar: How to use the auxiliary verb 'COULD'

Learn English Grammar: How to use the auxiliary verb 'COULD'

Bigeye Tuna Cutting Skills  - A very special knife in Taiwan

Bigeye Tuna Cutting Skills - A very special knife in Taiwan

Wishes  by Emi Fujita (with Lyrics)

Wishes by Emi Fujita (with Lyrics)

Bankruptcy: Last Week Tonight with John Oliver (HBO)

Bankruptcy: Last Week Tonight with John Oliver (HBO)

Playboi Carti - Long Time

Playboi Carti - Long Time

Revenue Streams: Crash Course Entrepreneurship #13

Revenue Streams: Crash Course Entrepreneurship #13

How To Open Lock Without Key | How To Break a Lock | open | lock | abcd

How To Open Lock Without Key | How To Break a Lock | open | lock | abcd

Lucy, This Gift Is Mine! Wolfoo Doesn't Want to Share - Kids Learning How to Share | Wolfoo Channel

Lucy, This Gift Is Mine! Wolfoo Doesn't Want to Share - Kids Learning How to Share | Wolfoo Channel