SlideShare a Scribd company logo
An introduction to
X.509 certificates
Stéphane Potier
stephane.potier [at] br-automation.com
Basics of cryptography
Symmetric cryptography
Private/Public-key algorithms
Secure Hash Function
Digital Signature
Symmetric cryptography
Symmetric cryptography (e.g. AES) is used for data encryption
A secret ciphering key is used for both encryption and decryption (128 or 256 bits
recommended)
The secret ciphering key must be known by both client and server, it must be exchanged in a
secure way between them
Based on secret ciphering key
Public and Private Key pair
The Public and Private Key pair comprise of two uniquely
mathematically related cryptographic keys
• A public key is made available to everyone
• A private key is confidential to its owner
Whatever is encrypted with a Public Key may only be decrypted
by its corresponding Private Key and vice versa
Public and Private Key pair is used by :
• Asymmetrical cryptography, for confidentiality
• Digital signature, for authentication
Unpredictable large random numbers
Asymmetrical cryptography
Public-key cryptography is a class of cryptographic protocols based on algorithms that require
Public and Private Key pair
• Public Key may be disseminated widely, Private Key is secret and only known by the owner
• The Public Key is used to encrypt the message, the Private Key to decrypt it
• For example, Bob uses the Public Key of Alice to encrypt a message. Alice is the only one that can decrypt the message. The
message remains confidential to anyone else since they do not know Alice’s Private Key.
Public-key algorithm
Secure Hash Algorithm (SHA)
Hash functions are used to map data of arbitrary size to data of fixed size
In cryptography, hash function produce a checksum (hash value) used to verify data integrity
A cryptographic hash function has following characteristics:
• Minor change in the input data completely change the hash value
• Easy verification that some input data maps to a given hash value
• Difficulty to reconstruct input data from hash value
SHA (Secure Hash Algorithm) is a
famous cryptographic hash function
• SHA0 is obsolete
• SHA1 is deprecated since 31/12/2016
• SHA2 is currently recommended
• SHA3 are newest version
Integrity of data
Digital signature
Digital signature ensure authentication and integrity of data
• Asymmetric cryptography used for data authentication
• Cryptographic hash function used for data integrity
Authentication and integrity of data
Combining symmetric and asymmetric algorithms
Symmetric cryptography
• Fast encryption requiring less processing power
• Secure exchange of ciphering key is necessary
Asymmetric cryptography
• Slow encryption method based on long keys (2048 bits)
• Requires public key infrastructure
Exchange of session key between Bob and Alice via asymmetric cryptography , then
symmetric cryptography based on this session key
Session key exchange
Basics of
X.509 certificates
X.509 certificate
A digital certificate certifies the ownership of a public key by the named subject of the
certificate
The digital certificate itself is protected by a digital signature whose authenticity can be verified
by the public key of the Certification Authority (CA) that issued the certificate
Ensuring authenticity and integrity
Certification Authority (CA)
Certification Authority (CA) issues certificates
Certificate is signed with the private key of the CA
CA’s private key must be very private, it is the basis of all trust for issued certificates
Trusted third party issuing certificates
Obtaining digital certificate
A certificate signing request (CSR) is sent from an applicant to a certificate authority in order
to apply for a digital identity certificate
Certificate signing request
Verifying digital certificate
Authentication and Integrity of a certificate is verified using the Public Key of the Certification
Authority that issued that certificate
Authentication and Integrity check
Certification path
Chain of trust
• A certificate contains its issuer (CA that signed it)
• The issuer’s certificate also contains its issuer (CA that signed issuer’s certificate)
• This chain of certificates is called a certification path
Digital certificates are verified using a chain of trust
Root certificate
A root certificate is the top-most certificate of the certification path
A root certificate is issued by a trusted certificate authority (CA), which self-sign it
The root certificate is usually made trustworthy by secure physical distribution (distributed with
operating system)
Top-most certificate of the certification path
Self-signed
Verification of digital certificates
1. Client (i.e. web browser) initiate a TLS handshake with Amazon website, and gets certificates for both Amazon and Symantec
2. Client verifies Amazon’s certificate using Symantec’s Public Key contained in Symantec’s certificate
3. Client verifies Symantec’s certificate using VeriSign’s Public Key contained in VeriSign’s certificate (VeriSign’s certificate is a root
certificate locally stored on the client by the operating system)
Digital certificates are verified using a chain of trust
Self-signed certificate
A self-signed certificate :
• Is signed by issuer to identify itself
• Is signed by issuer with its own private key
• Has no Certificate Authority
The benefits:
• Self-signed certificates are free of charge (unlike CA issued certificates)
The risks :
• Self-signed certificates are not issued by a trusted certificate authority (1)
• Since client can not trust this self-signed certificate, it will raise a warning
• Users must avoid being “trained” to bypass warnings or add exceptions
→ An entity accepting a self-signed certificate must follow similar trusting process than the
addition of a new CA certificate
(1) Excepted for root certificates that are self-signed and issued by trusted certification authority
Risks and benefits
X.509 certificate encodings and file extensions
DER vs. CRT vs. CER vs. PEM
Certificate encodings Encoding type
PEM (Privacy Enhanced Mail) Base64 ASCII encoding
DER (Distinguished Encoding Rules) Binary encoding
Certificate file extension Encoding type
.cer PEM or DER
.crt PEM or DER
.der DER
.pem PEM
DER encoded, .cer file extension, certificate
PEM encoded, .pem file extension, certificate
Certificate store
A certificate store is used to store and manage digital certificates
Certificate store usually contains :
• Own private keys
• Own certificates
• Trusted 3rd party certificates
• Revocation list (certificates revoked by the issuing CA before their scheduled expiration date and should no longer be trusted)
Most well-known root certificates are usually stored in the certificate store
It is possible to add a root (signed by CA) certificate or a self-signed certificate in the
certificate store
Only add a trusted certificate in the certificate store !!!
Storage of digital certificates
Expired certificate
Every certificate has an expiry date, meaning the time and date past which the certificate is no
longer valid
The client determines what happens once certificate expires on a server
• The client can not connect to the server
• A warning is raised to indicate certificate has expired
• …
Before current certificate expires, a new certificate must be installed in the server
Validity date expiry
PERFECTION IN AUTOMATION
Ad

More Related Content

What's hot (20)

X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
Sou Jana
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
Chirag Patel
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
Dr.Florence Dayana
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
Nishant Pahad
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
Prateek Pandey
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
Theo Gravity
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
Mijanur Rahman Milon
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Pina Parmar
 
Kerberos
KerberosKerberos
Kerberos
Rahul Pundir
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Pushkar Dutt
 
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptxMD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
 
Ipsec
IpsecIpsec
Ipsec
Rupesh Mishra
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
Sou Jana
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
Chirag Patel
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
vimal kumar
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
Theo Gravity
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
Mijanur Rahman Milon
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Pina Parmar
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
Zara Nawaz
 
Pretty good privacy
Pretty good privacyPretty good privacy
Pretty good privacy
Pushkar Dutt
 
MD5 ALGORITHM.pptx
MD5 ALGORITHM.pptxMD5 ALGORITHM.pptx
MD5 ALGORITHM.pptx
Rajapriya82
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 

Similar to An introduction to X.509 certificates (20)

SSL
SSLSSL
SSL
Badrul Alam bulon
 
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdfpresentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
 
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
David Ochel
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World
 
Public Key Infrastructure and Application_Applications.ppt
Public Key Infrastructure and Application_Applications.pptPublic Key Infrastructure and Application_Applications.ppt
Public Key Infrastructure and Application_Applications.ppt
lanhuongvernon
 
PKI_Applications digital certificate.ppt
PKI_Applications digital certificate.pptPKI_Applications digital certificate.ppt
PKI_Applications digital certificate.ppt
ubaidullah75790
 
Authentication services
Authentication servicesAuthentication services
Authentication services
Greater Noida Institute Of Technology
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
Mike Chapple
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
promediakw
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
Mohammad Yousri
 
[Note]x509
[Note]x509[Note]x509
[Note]x509
Yu-Ting Chen
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Sylvain Maret
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
Olle E Johansson
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
CheapSSLUSA
 
Https
HttpsHttps
Https
Billa Kota Sriram
 
Web security
Web securityWeb security
Web security
Muhammad Usman
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
Maarten Smeets
 
The last picks
The last picksThe last picks
The last picks
Nafiur Rahman Tuhin
 
020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPS020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPS
Jackio Kwok
 
presentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdfpresentation2-151203145018-lva1-app6891.pdf
presentation2-151203145018-lva1-app6891.pdf
GumanSingh10
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
 
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operatorsCertificates, PKI, and SSL/TLS for infrastructure builders and operators
Certificates, PKI, and SSL/TLS for infrastructure builders and operators
David Ochel
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World
 
Public Key Infrastructure and Application_Applications.ppt
Public Key Infrastructure and Application_Applications.pptPublic Key Infrastructure and Application_Applications.ppt
Public Key Infrastructure and Application_Applications.ppt
lanhuongvernon
 
PKI_Applications digital certificate.ppt
PKI_Applications digital certificate.pptPKI_Applications digital certificate.ppt
PKI_Applications digital certificate.ppt
ubaidullah75790
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
Mike Chapple
 
Dr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talkDr. Omar Ali Alibrahim - Ssl talk
Dr. Omar Ali Alibrahim - Ssl talk
promediakw
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Sylvain Maret
 
#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS#MoreCrypto : Introduction to TLS
#MoreCrypto : Introduction to TLS
Olle E Johansson
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
CheapSSLUSA
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
Maarten Smeets
 
020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPS020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPS
Jackio Kwok
 
Ad

More from Stephane Potier (7)

Create your own OPC UA information model
Create your own OPC UA information modelCreate your own OPC UA information model
Create your own OPC UA information model
Stephane Potier
 
OPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion SpecificationsOPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion Specifications
Stephane Potier
 
Emballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelleEmballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelle
Stephane Potier
 
Industry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging linesIndustry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging lines
Stephane Potier
 
Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0
Stephane Potier
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
Stephane Potier
 
Safety versus security
Safety versus securitySafety versus security
Safety versus security
Stephane Potier
 
Create your own OPC UA information model
Create your own OPC UA information modelCreate your own OPC UA information model
Create your own OPC UA information model
Stephane Potier
 
OPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion SpecificationsOPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion Specifications
Stephane Potier
 
Emballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelleEmballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelle
Stephane Potier
 
Industry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging linesIndustry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging lines
Stephane Potier
 
Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0
Stephane Potier
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
Stephane Potier
 
Ad

Recently uploaded (20)

The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 

An introduction to X.509 certificates

  • 1. An introduction to X.509 certificates Stéphane Potier stephane.potier [at] br-automation.com
  • 2. Basics of cryptography Symmetric cryptography Private/Public-key algorithms Secure Hash Function Digital Signature
  • 3. Symmetric cryptography Symmetric cryptography (e.g. AES) is used for data encryption A secret ciphering key is used for both encryption and decryption (128 or 256 bits recommended) The secret ciphering key must be known by both client and server, it must be exchanged in a secure way between them Based on secret ciphering key
  • 4. Public and Private Key pair The Public and Private Key pair comprise of two uniquely mathematically related cryptographic keys • A public key is made available to everyone • A private key is confidential to its owner Whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa Public and Private Key pair is used by : • Asymmetrical cryptography, for confidentiality • Digital signature, for authentication Unpredictable large random numbers
  • 5. Asymmetrical cryptography Public-key cryptography is a class of cryptographic protocols based on algorithms that require Public and Private Key pair • Public Key may be disseminated widely, Private Key is secret and only known by the owner • The Public Key is used to encrypt the message, the Private Key to decrypt it • For example, Bob uses the Public Key of Alice to encrypt a message. Alice is the only one that can decrypt the message. The message remains confidential to anyone else since they do not know Alice’s Private Key. Public-key algorithm
  • 6. Secure Hash Algorithm (SHA) Hash functions are used to map data of arbitrary size to data of fixed size In cryptography, hash function produce a checksum (hash value) used to verify data integrity A cryptographic hash function has following characteristics: • Minor change in the input data completely change the hash value • Easy verification that some input data maps to a given hash value • Difficulty to reconstruct input data from hash value SHA (Secure Hash Algorithm) is a famous cryptographic hash function • SHA0 is obsolete • SHA1 is deprecated since 31/12/2016 • SHA2 is currently recommended • SHA3 are newest version Integrity of data
  • 7. Digital signature Digital signature ensure authentication and integrity of data • Asymmetric cryptography used for data authentication • Cryptographic hash function used for data integrity Authentication and integrity of data
  • 8. Combining symmetric and asymmetric algorithms Symmetric cryptography • Fast encryption requiring less processing power • Secure exchange of ciphering key is necessary Asymmetric cryptography • Slow encryption method based on long keys (2048 bits) • Requires public key infrastructure Exchange of session key between Bob and Alice via asymmetric cryptography , then symmetric cryptography based on this session key Session key exchange
  • 10. X.509 certificate A digital certificate certifies the ownership of a public key by the named subject of the certificate The digital certificate itself is protected by a digital signature whose authenticity can be verified by the public key of the Certification Authority (CA) that issued the certificate Ensuring authenticity and integrity
  • 11. Certification Authority (CA) Certification Authority (CA) issues certificates Certificate is signed with the private key of the CA CA’s private key must be very private, it is the basis of all trust for issued certificates Trusted third party issuing certificates
  • 12. Obtaining digital certificate A certificate signing request (CSR) is sent from an applicant to a certificate authority in order to apply for a digital identity certificate Certificate signing request
  • 13. Verifying digital certificate Authentication and Integrity of a certificate is verified using the Public Key of the Certification Authority that issued that certificate Authentication and Integrity check
  • 14. Certification path Chain of trust • A certificate contains its issuer (CA that signed it) • The issuer’s certificate also contains its issuer (CA that signed issuer’s certificate) • This chain of certificates is called a certification path Digital certificates are verified using a chain of trust
  • 15. Root certificate A root certificate is the top-most certificate of the certification path A root certificate is issued by a trusted certificate authority (CA), which self-sign it The root certificate is usually made trustworthy by secure physical distribution (distributed with operating system) Top-most certificate of the certification path Self-signed
  • 16. Verification of digital certificates 1. Client (i.e. web browser) initiate a TLS handshake with Amazon website, and gets certificates for both Amazon and Symantec 2. Client verifies Amazon’s certificate using Symantec’s Public Key contained in Symantec’s certificate 3. Client verifies Symantec’s certificate using VeriSign’s Public Key contained in VeriSign’s certificate (VeriSign’s certificate is a root certificate locally stored on the client by the operating system) Digital certificates are verified using a chain of trust
  • 17. Self-signed certificate A self-signed certificate : • Is signed by issuer to identify itself • Is signed by issuer with its own private key • Has no Certificate Authority The benefits: • Self-signed certificates are free of charge (unlike CA issued certificates) The risks : • Self-signed certificates are not issued by a trusted certificate authority (1) • Since client can not trust this self-signed certificate, it will raise a warning • Users must avoid being “trained” to bypass warnings or add exceptions → An entity accepting a self-signed certificate must follow similar trusting process than the addition of a new CA certificate (1) Excepted for root certificates that are self-signed and issued by trusted certification authority Risks and benefits
  • 18. X.509 certificate encodings and file extensions DER vs. CRT vs. CER vs. PEM Certificate encodings Encoding type PEM (Privacy Enhanced Mail) Base64 ASCII encoding DER (Distinguished Encoding Rules) Binary encoding Certificate file extension Encoding type .cer PEM or DER .crt PEM or DER .der DER .pem PEM DER encoded, .cer file extension, certificate PEM encoded, .pem file extension, certificate
  • 19. Certificate store A certificate store is used to store and manage digital certificates Certificate store usually contains : • Own private keys • Own certificates • Trusted 3rd party certificates • Revocation list (certificates revoked by the issuing CA before their scheduled expiration date and should no longer be trusted) Most well-known root certificates are usually stored in the certificate store It is possible to add a root (signed by CA) certificate or a self-signed certificate in the certificate store Only add a trusted certificate in the certificate store !!! Storage of digital certificates
  • 20. Expired certificate Every certificate has an expiry date, meaning the time and date past which the certificate is no longer valid The client determines what happens once certificate expires on a server • The client can not connect to the server • A warning is raised to indicate certificate has expired • … Before current certificate expires, a new certificate must be installed in the server Validity date expiry