What is a public key certificate? (2024)

What is a public key certificate? (1)

By

  • TechTarget Contributor

What is a public key certificate?

A public key certificate is a digitally signed document that serves to validate the sender's authorization and name. It uses a cryptographic structure that binds a public key to an entity, such as a user or organization. The digital document is generated and issued by a trusted third party called a certification authority.

Public key certificates, which are also known as digital certificates, include the public key, identity information about the owner and the name of the issuing certificate authority (CA). The CA, a trusted third party, issues digital certificates that verify the identity of parties in an exchange of information over the internet. A digital certificate provides assurance of a person's identity, and the CA establishes that assurance by validating the identity of the person who requests the certificate.

How does a public key certificate work?

Public key certificates form a part of a public key infrastructure (PKI) system that uses encryption technology to secure messages and data. A public key certificate uses a pair of encryption keys, one public and one private. The public key is made available to anyone who wants to verify the identity of the certificate holder, while the private key is a unique key that is kept secret. This enables the certificate holder to digitally sign documents, emails and other information without a third party being able to impersonate them. The four main components of PKI are public key encryption, trusted third parties such as the CA, the registration authority and the certificate database or store.

What is a public key certificate? (2)

There are different types of public key certificates for different functions, such as authorization for a specific type of action. The following are common fields found in digital certificates:

  • Serial number. This number distinguishes the certificate from other certificates.
  • Algorithm information. The issuer uses this algorithm to sign the certificate.
  • Issuer. This is the name of the CA that issued the certificate.
  • Validity period of the certificate. These are the start and end dates that define when the certificate is valid.
  • Subject distinguished name. This is the name of the identity to which the certificate is issued.
  • Subject public key information. This is the public key that is associated with the identity.

What are the different types of certificates?

Transport Layer Security/Secure Sockets Layer (TLS/SSL) certificates. These certificates are the core of transport layer security (TLS) protocol, which is an updated version of SSL. These digital files contain a public encryption key that is used to validate server identity and a digital signature to ensure the integrity and the source of data and other information transmitted online. These certificates facilitate the exchange of encryption keys between web servers and browsers, which enable a secured connection.

The chain of trust, trust path or trust chain is a sequence of certificates that a web browser must traverse to verify that a particular website is authentic and, therefore, secure. A chain of trust typically includes a root certificate, an intermediate certificate and a leaf certificate.

There are multiple types of TLS/SSL certificates:

  • Domain validation (DV) certificates. These certificates are typically the most basic and most affordable type of certificate web browsers trust. DV certificates require that the domain name of an organization is verified by the issuing CA before they are issued. These certificates can be issued within minutes and do not require the website owner to prove their identity. When a browser sees a DV certificate, it trusts that the owner of the domain is indeed the owner of the certificate and that the certificate is only meant for that specific domain.
  • Organization validation (OV) certificates. An OV certificate is one of the ways that organizations can be validated for quality assurance through a formal and accredited process. Organization validation is a process of validating the identity of the root certificate authority, followed by a validation of the business or organization requesting the certificate.
  • Individual validation (IV) certificates. These are certificates that are issued to individuals -- not organizations -- making them popular choices among consumers, particularly for securing email.
  • Extended validation (EV) certificates. These certificates are issued after an extensive vetting process by both a CA and the CA's reputation partners. Under the EV guidelines established by the CA/Browser Forum, in addition to meeting the validity requirements, the applicant must submit proof of their identity, and the organization must pass an independent audit. The combination of these factors helps to provide an extra layer of trust in the identity of the site owner. Companies issuing EV certificates are also required to pass an independent audit.

While less common than server certificates, client certificates authenticate the identity of the user who wants to connect to a TLS service, rather than a device seeking a connection.

Email certificate. Secure/Multipurpose Internet Mail Extensions (S/MIME) is a standard for sending encrypted email. RSA security created it to resolve the problem of sending encrypted email without the need to exchange a public key. It is commonly used within an organization that has its own CA.

EMV certificate. EMV payment cards have an embedded microchip containing a card issuer certificate. The embedded microchip enables the EMV payment card to generate a unique code for each transaction. EMV stands for Europay, MasterCard and Visa, the organizations that constitute the certificate authority.

Code-signing certificate. Code-signing certificates are used in software development and IT operations to digitally sign the software or firmware of an application or device. This provides recipients with assurance about who created the code and the integrity of the code.

Root certificate. A root certificate is a digital certificate that is used to sign other digital certificates. It is sometimes referred to as a trust anchor because it is at the top of a hierarchy of digital certificates that are used to verify other digital certificates. The hierarchy starts with a root certificate, which is the highest level of certificate. The root certificate is verified by a second-level certificate, which is verified by a third-level certificate, and so on.

Intermediate certificate. The intermediate certificate is used to sign other certificates and is best used as a bridge between a root CA and a subordinate CA. An intermediate certificate is used to sign end-user certificates that a website or a local server uses. The root certificates verify the identity of the intermediate certificate, which in turn verifies the end-user certificates.

Leaf certificate. A leaf certificate, or an end entity, is the endpoint for the signing and encrypting of data and cannot be used to sign other certificates. These include TLS/SSL, email and code-signing certificates.

Self-signed certificate. A self-signed certificate is a certificate that is signed by the same entity to whom it is assigned. Most certificates can be self-signed and are verified by their own public key. They are not signed by a CA, which means they might be perceived as less trustworthy.

Advantages and disadvantages of public key certificates

The main advantage of using public key certificates is that they enable secure authentication. The integrity of the public key certificate is guaranteed by the CA. Further, this type of certificate prevents man-in-the-middle attacks, which occur when a malicious third party intercepts the communication between two entities and relays the message between them. Lastly, public key certificates are supported by many enterprise networks and applications, and the process is transparent and efficient.

The biggest disadvantage of public key certificates is a lack of control over the encryption key. This means that if the certificate is compromised, it cannot be revoked. Someone could hack into the server to steal the certificate and use the public key in the certificate to decrypt any information that was encrypted with the public key. A fraudulent root certificate can be installed, and a browser does not provide warning when a web certificate is changed.

Before buying a digital certificate, review this buyer's handbook to learn how they work, which features are a must and how to evaluate the available options.

This was last updated in June 2021

Continue Reading About public key certificate

  • How to use a public key and private key in digital signatures
  • PKI authentication explained: The basics for IT administrators
  • Updating TLS? Use cryptographic entropy for more secure keys
  • Domain validation certificates: What are the security issues?
  • What does a Windows 10 digital certificate do?

Related Terms

What is identity threat detection and response (ITDR)?
Identity threat detection and response (ITDR) is a collection of tools and best practices aimed at defending against cyberattacks...Seecompletedefinition
What is LDAP (Lightweight Directory Access Protocol)?
LDAP (Lightweight Directory Access Protocol) is a software protocol used for locating data about organizations, individuals and ...Seecompletedefinition
What is SSH (Secure Shell) and How Does It Work?
SSH (Secure Shell or Secure Socket Shell) is a network protocol that gives users -- particularly systems administrators -- a ...Seecompletedefinition

Dig Deeper on Identity and access management

  • digital signatureBy: CameronHashemi-Pour
  • Secure Sockets Layer certificate (SSL certificate)By: RahulAwati
  • CSR (Certificate Signing Request)By: SharonShea
  • X.509 certificateBy: AlexanderGillis
What is a public key certificate? (2024)
Top Articles
Think your Pringles have shrunk? You're right - and here's why
Legal - FaceTime & Privacy - Apple
Restored Republic January 20 2023
Culver's Flavor Of The Day Wilson Nc
Hk Jockey Club Result
St Als Elm Clinic
Jesus Revolution Showtimes Near Chisholm Trail 8
Does Pappadeaux Pay Weekly
Tripadvisor Near Me
Our Facility
Blue Beetle Showtimes Near Regal Swamp Fox
Amelia Bissoon Wedding
Mens Standard 7 Inch Printed Chappy Swim Trunks, Sardines Peachy
How to find cash from balance sheet?
Bfg Straap Dead Photo Graphic
Bitlife Tyrone's
Army Oubs
Glenda Mitchell Law Firm: Law Firm Profile
Best Mechanics Near You - Brake Masters Auto Repair Shops
Kaitlyn Katsaros Forum
Obituaries Milwaukee Journal Sentinel
Jermiyah Pryear
California Online Traffic School
Breckiehill Shower Cucumber
Local Collector Buying Old Motorcycles Z1 KZ900 KZ 900 KZ1000 Kawasaki - wanted - by dealer - sale - craigslist
Synergy Grand Rapids Public Schools
Maine Racer Swap And Sell
Pixel Combat Unblocked
Yu-Gi-Oh Card Database
Where Can I Cash A Huntington National Bank Check
Memberweb Bw
Workday Latech Edu
Polk County Released Inmates
Hotels Near New Life Plastic Surgery
Alpha Asher Chapter 130
18 terrible things that happened on Friday the 13th
Urban Blight Crossword Clue
Colorado Parks And Wildlife Reissue List
The Listings Project New York
Studentvue Calexico
Bmp 202 Blue Round Pill
Lyons Hr Prism Login
Frequently Asked Questions
Accident On 40 East Today
Sc Pick 3 Past 30 Days Midday
Www Pig11 Net
Food and Water Safety During Power Outages and Floods
R Detroit Lions
Strange World Showtimes Near Atlas Cinemas Great Lakes Stadium 16
How to Get a Check Stub From Money Network
Ubg98.Github.io Unblocked
Latest Posts
Article information

Author: Duane Harber

Last Updated:

Views: 5641

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.