Public key certificate

Share This
« Back to Glossary Index

A public key certificate, also known as a digital certificate, is a digital document used in cryptography to verify the ownership of a public key. It contains information about the key, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate’s contents (called the issuer). There are various types of certificates, including root, intermediate, end-entity, and wildcard certificates, each serving different functions within the certificate hierarchy. Certificate Authorities (CAs) such as IdenTrust, DigiCert, and Sectigo, issue these certificates and also manage their revocation. Certificates are crucial in website[1] security[2], ensuring secure connections over SSL/TLS protocols, and offer different validation levels. They follow certain standards and are recommended for secure website usage. Understanding public key certificates is integral to appreciating web security and encryption.

Terms definitions
1. website. This text primarily discusses the concept of a "Web site. A website is a collection of interconnected web pages, usually including a homepage, located on the same server and prepared and maintained as a collection of data by a person, group, or organization. Websites are a cornerstone of the internet, serving as hubs for information, commerce, communication, and entertainment. They can have various forms such as business sites, gaming sites, academic platforms, or social networking sites. Websites have evolved over time, from text and static images to dynamic, interactive multimedia platforms. The development and functionality of websites are governed by web standards set by the World Wide Web Consortium (W3C). Websites are also influenced by advancements in web server technology and design principles such as responsive design.
2. security. Security, as a term, originates from the Latin 'securus,' meaning free from worry. It is a concept that refers to the state of being protected from potential harm or threats. This protection can apply to a wide range of referents, including individuals, groups, institutions, or even ecosystems. Security is closely linked with the environment of the referent and can be influenced by different factors that can make it either beneficial or hostile. Various methods can be employed to ensure security, including protective and warning systems, diplomacy, and policy implementation. The effectiveness of these security measures can vary, and perceptions of security can differ widely. Important security concepts include access control, assurance, authorization, cipher, and countermeasures. The United Nations also plays a significant role in global security, focusing on areas like soil health and food security.

At cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the validity of a public key. The certificate includes the public key and information about it, information about the identity of its owner (called the subject), and the digital signature of an entity that has verified the certificate's contents (called the issuer). If the device examining the certificate trusts the issuer and finds the signature to be a valid signature of that issuer, then it can use the included public key to communicate securely with the certificate's subject. In email encryption, code signing, and e-signature systems, a certificate's subject is typically a person or organization. However, in Transport Layer Security (TLS) a certificate's subject is typically a computer or other device, though TLS certificates may identify organizations or individuals in addition to their core role in identifying devices. TLS, sometimes called by its older name Secure Sockets Layer (SSL), is notable for being a part of HTTPS, a protocol for securely browsing the web.

In a typical public-key infrastructure (PKI) scheme, the certificate issuer is a certificate authority (CA), usually a company that charges customers a fee to issue certificates for them. By contrast, in a web of trust scheme, individuals sign each other's keys directly, in a format that performs a similar function to a public key certificate. In case of key compromise, a certificate may need to be revoked.

The most common format for public key certificates is defined by X.509. Because X.509 is very general, the format is further constrained by profiles defined for certain use cases, such as Public Key Infrastructure (X.509) as defined inRFC 5280.

« Back to Glossary Index
en_USEN
Scroll to Top