It is similar to a passport or driver's license. This is also termed as Public-key cryptography. The sym… Based on the identity of thedigital certificate, transactions are made securely over public networks such as the Internet. The most widely used format of a digital certificate is as defined by the CCITT X.509 standards.

The Role of Certificate Authorities in Public Key Cryptography. Applications of Public-Key Crypto!Encryption for confidentiality •Anyone can encrypt a message –With symmetric crypto, must know secret key to encrypt Public-key cryptography, or asymmetric cryptography, is an encryption scheme that uses two mathematically related, but not identical, keys - a public key and a private key. Each participant in a protocol that uses asymmetric cryptography has at least one keypair, which consists of two keys: Their secret key, which MUST NOT ever shared with anyone; Their public key, which is derived from the secret key, and can shared with everyone Unlike symmetric key algorithms that rely on one key to both encrypt and decrypt, each key performs a unique function. 24Digital Certificate provides an electronic identity to conduct secure transactions by providing your identity (authentication). Because of this, public keys can be freely shared, allowing users an easy and convenient method for encrypting content and verifying digital signatures, and private keys can be kept secret, ensuring only the owners of the private keys can decrypt content and create digital signatures.Since public keys need to be shared but are too big to be easily remembered, they are stored on digital certificates for secure transport and sharing. The advantages of public key cryptography are:• No need to exchange the keys• Another key cannot be derived from one key• The confidentiality of the message can be ensured by using the public key cryptography• It is possible to establish authentication of the sender by using public key cryptography (digital signature)• It is possible to ensure the confidentiality and authentication of the message at the same time• It is possible to use public key cryptography for session key exchange

The public-key encryption system introduced the concept of digital signatures and electronic credentials.

CA issues the digital certificate based on the recommendation of RA. Final component of the PKI is the Certificate Management System (CMS) through which certificates are published, renewed, or revoked. Different web applications may insist to use a particular certificate. • The confidentiality of the message can be ensured by using the public key cryptography• It is possible to establish authentication of the sender by using public key cryptography (digital signature)• It is possible to ensure the confidentiality and authentication of the message at the same time• It is possible to use public key cryptography for session key exchangePublic Key Cryptography is used in a number of applications and systems software.

With a digital certificate, an organization or an individual can provide authentication for all the transactions with friends, business partners, and other online services. Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. Once identity is proved, it stamps the certificate to prevent modifications of the details contained in the certificate. In cryptography, keys are strings of random-looking characters. Unlike symmetric key algorithms that rely on one key to both encrypt and decrypt, each key performs a unique function. Key pairs are obtained from a third-party trusted authority called Certificate Authority (CA). The information in the certificate should conform to the ITU (IETF) standard X.509 v3. Certificates conforming to that standard include information about the published identity of the owner of the corresponding public key, the key length, the algorithm used, associated hashing algorithm, dates of validity of the certificate, and the actions the key can be used for.A CA is responsible for issuing certificates. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security. Some examples of application of cryptography are:• Digital signatures in the Operating System software such as Ubuntu, Red Hat Linux packages distributionA Public Key Infrastructure (PKI) enables users to securely transact through the use of public key cryptography. An individual or organization may have any number of certificates issued by different CAs. It follows a varied and protected method in the transmission of information. Academic library - free online college e textbooks - info{at}ebrary.net - © 2014 - 2020

The public key is used to encrypt and the private key is used to decrypt.It is computationally infeasible to compute the private key based on the public key. Other applications of public key cryptography include S/MIME certificates, which validate email senders and encrypt email contents to protect against spear fishing attacks and SSH keys to control employee access to servers. Digital certificate assures identity among all the parties involved in the transactions. It is a relatively new concept.Symmetric cryptography was well suited for organizations such as governments, military, and big financial corporations were involved in the classified communication.With the spread of more unsecure computer networks in last few decades, a genuine need was felt to use cryptography at larger scale. Using a couple of keys, both the sender and receiver go with encryption and decryption processes.