Digital certificates and PKI | Identification for Development (2024)

Digital certificates facilitate secure electronic communication and data exchange between people, systems, and devices online. They are issued by Certificate Authorities (CAs) and perform two primary functions:

  • Verifying the identity of the sender/receiver of an electronic message

  • Providing the means to encrypt/decrypt messages between sender and receiver (i.e., binding and entity to their public key)

There are three basic types of digital signature certificates:

  • Individual digital signature certificates (signing certificates): These certificates are used to identify a person and include personal information. They can be used to sign electronic documents (i.e., to provide electronic signatures) and emails, and to implement access control mechanisms for sensitive or valuable information.

  • Server certificates: These certificates identify a server (computer) and contain the host name or IP address. They are used for one- or two-layer SSL to ensure secure communication of data over a network.

  • Encryption certificates: These certificates are used to encrypt a message using the public key of the recipient to ensure data confidentiality during transmission. Different signatures for encryption and digital signatures are available from different CAs. (adapted from Government of India 2010)

Figure 13. Digital certificates

Digital certificates and PKI | Identification for Development (1)

A system—including policies, institutions, and technologies—that manages the distribution, authentication, and revocation of digital certificates is often referred to as public-key infrastructure (PKI). Because digital certificates are standard in data exchange and security protocols for digital ID systems (including the TLS encryption measures described above, as well as smartcard- and mobile-based authentication), a country’s PKI is landscape is a common building block for many ID systems.

For example, when a smartcard or SIM card that uses PKI for authentication and digital signatures is personalized, it is issued with a private key and digital certificate signed by a CA that attests to the authenticity of the credential and provides the public-key necessary for other devices (e.g., card readers, servers, etc.) to verify the authenticity and integrity of the card.

While it is possible for an ID provider to create its own digital certificates, it is often more practical and reliable to use a trusted third party as the CA and/or Root Certificate Authority. Future versions of this Guide will include a deeper description of various options for setting up a PKI infrastructure, as well as alternatives.

Digital certificates and PKI | Identification for Development (2024)

FAQs

What is PKI and digital certificates? ›

In conclusion, Public Key Infrastructure (PKI) and Digital Certificates are critical components of online security. PKI provides a framework for securely exchanging and verifying public keys, while Digital Certificates serve as digital identities that enable secure communication and data exchange.

What is PKI development? ›

Public Key Infrastructure (PKI) is a system of processes, technologies, and policies that allows you to encrypt and sign data. You can issue digital certificates that authenticate the identity of users, devices, or services.

What is the PKI standard for digital certificates? ›

These identities are stored in a standard X. 509 digital public key certificate format. Certification authorities (CAs) represent the people, processes, and tools to create digital certificates that securely bind the names of users to their public keys. In creating certificates, CAs act as agents of trust in a PKI.

What is the main purpose of a digital certificate? ›

A digital certificate is a file or electronic password that proves the authenticity of a device, server, or user through the use of cryptography and the public key infrastructure (PKI). Digital certificate authentication helps organizations ensure that only trusted devices and users can connect to their networks.

What is an example of a digital certificate? ›

A digital certificate primarily acts like an identification card; something like a driver's license, a passport, a company ID, or a school ID.

What is the difference between a digital certificate and a public key? ›

A digital certificate holds two keys: a public key and a private key. While the receiver has the recipient's private key, the certificate contains the public key. A message that has been encrypted with a public key can only be decrypted with the mathematically linked private key.

What is an example of a PKI certificate? ›

Common examples of PKI security today are SSL certificates on websites so that site visitors know they're sending information to the intended recipient, digital signatures, and authentication for Internet of Things devices.

How to generate a PKI certificate? ›

How to get a PKI certificate
  1. Request the certificate online. The first step in getting a PKI certificate is typically to request one online. ...
  2. Install the PKI certificate. When you receive approval for a PKI certificate, the source usually sends it to you via email. ...
  3. Calibrate the security settings.
Feb 3, 2023

What is PKI in Devops? ›

For example, consider public key infrastructure (PKI), a security technology that is commonly used to authenticate identities, devices and software.

How do you obtain a digital certificate? ›

Digital certificates are issued by Certificate Authorities, also called Trust Service Providers. Once a Trust Service Provider issues a digital certificate, it can be stored on a smart card, USB drive, local computer, mobile phone, or in the cloud.

Which protocol is used for digital certificates? ›

The TLS protocol relies on public key encryption. The sending computer uses the public key of the receiving computer when encrypting data. Before that happens, though, TLS requires a step that is crucial to its security: the sender must verify the identity behind the public key.

What keys are in a digital certificate? ›

The receiver of the certificate uses the public key to decipher encrypted text sent by the certificate owner to verify its identity. A public key has a corresponding private key that encrypts the text. Certificate authority's distinguished name. The issuer of the certificate identifies itself with this information.

What is the difference between PKI and digital certificates? ›

PKI is a collection of systems and procedures that enables PKI certificates, also known as digital certificates. These certificates are electronic documents, which, via the underlying PKI that binds the public key in a key pair to its entity, verify the authenticity of the entity.

What are the disadvantages of digital certificate? ›

One of the main disadvantages of digital certificates is that they can be relatively complex to manage and implement. Setting up and configuring digital certificates requires technical expertise, and there can be challenges associated with integrating certificates into existing IT infrastructure.

How effective are digital certificates? ›

Check their security credentials, read user reviews, and understand their verification process. In conclusion, digital certificates can be just as safe, if not safer, than their physical counterparts, provided they are issued through secure, reputable platforms.

What is the difference between PKI and CA? ›

The purpose of a PKI is to securely associate a key with an entity. The trusted party signing the document associating the key with the device is called a certificate authority (CA). The certificate authority also has a cryptographic key that it uses for signing these documents. These documents are called certificates.

Is PKI the same as SSL? ›

1 PKI vs SSL certificates

SSL stands for secure sockets layer, which is a protocol that uses PKI to establish encrypted and authenticated connections between a client and a server. An SSL certificate is a type of digital certificate that verifies the identity and validity of a website or application.

Why do I need a PKI certificate? ›

PKI increases trust on the internet because it provides a system and infrastructure to secure data, user and device identities and ensure the integrity of the data has remained intact and is authentic. With PKI, you can issue digital certificates that authenticate the identity of users, devices, or services.

Top Articles
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 5696

Rating: 4.7 / 5 (57 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.