From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Create a digital certificate
From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Create a digital certificate
- [Instructor] Now that you understand hash functions and digital signatures, I can explain how a certificate authority creates a digital certificate that associates a public key with an individual or organization. The process for creating digital certificates follows the X.509 standard created by the international telecommunications union. Therefore, you might hear digital certificates referred to as X.509 certificates. Let's say that Alice wants to obtain a new digital certificate. Alice first creates a public private key pair for the encryption algorithm of her choice. She then creates a message called a Certificate Signing Request or CSR. The CSR contains Alice's public key, as well as her name, and other identifying information such as an email address, or a server name. Alice then sends the CSR to the certificate authority of her choice. This might be an independent organization that is trusted by many people…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
Trust models2m 52s
-
PKI and digital certificates4m 5s
-
Hash functions7m 38s
-
Digital signatures3m 51s
-
Digital signature standard1m 40s
-
Create a digital certificate4m 55s
-
Revoke a digital certificate1m 41s
-
Certificate stapling2m 29s
-
Certificate authorities6m 13s
-
Certificate subjects3m 35s
-
Certificate types2m 55s
-
Certificate formats2m 30s
-
-
-
-
-
-