Certificate functions

Legancy authentication problem - no encryption

Public Key cryptography can help on this using Public and Private Keys

CA - Certificates Authorities

They issue and sign certificates

Can be an Internal CA or Public CA

Flow

  1. Generate CSR with our information (Company)

  2. Send CSR to CA

  3. CA use your information to sign the certificate

Utilities

  1. Identification

  2. Authentication

  3. Controlling Access

Provides

  1. Non Repudiation

Type of Keys

Private - it signs a message and decrypt the messages

Public - give to anyone to validate the sender and encrypt the data

Certificates Impacts

PKI - Public Key Infrastructure

  1. Encrypt data in transit

  2. encrypts data

  3. create secure web connetions like - HTTPS,sFTP,SSH

Considerations

Symetric

  1. Private Keys

  2. Pre-shared Keys

  3. Same key to encrypt and decrypt

  4. Faster to encrypt and decrypt

  5. Both sides must have keys

  6. Less secure

Asymmetric

  1. Public and Private Keys

  2. Different Key to Encrypt and Decrypt

  3. Slow to encrypt and decrypt

  4. One side have Private Key

  5. Other Side have the Public Key

  6. One Way Encryption / Decryption

  7. MoreSecure

Last updated