Back to 课程

Computer-science_A-level_Cie

0% Complete
0/0 Steps
  1. computers-and-components
    6 主题
  2. logic-gates-and-logic-circuits
    2 主题
  3. central-processing-unit-cpu-architecture
    6 主题
  4. assembly-language-
    4 主题
  5. bit-manipulation
    1 主题
  6. operating-systems
    3 主题
  7. language-translators
    2 主题
  8. data-security
    3 主题
  9. data-integrity
    1 主题
  10. ethics-and-ownership
    3 主题
  11. database-concepts
    3 主题
  12. database-management-systems-dbms-
    1 主题
  13. data-definition-language-ddl-and-data-manipulation-language-dml
    1 主题
  14. computational-thinking-skills
    1 主题
  15. algorithms
    14 主题
  16. data-types-and-records
    2 主题
  17. arrays
    2 主题
  18. files
    1 主题
  19. introduction-to-abstract-data-types-adt
    1 主题
  20. programming-basics
    1 主题
  21. constructs
    2 主题
  22. structured-programming
    1 主题
  23. program-development-life-cycle
    2 主题
  24. program-design-
    2 主题
  25. program-testing-and-maintenance
    3 主题
  26. user-defined-data-types
    1 主题
  27. file-organisation-and-access-
    3 主题
  28. floating-point-numbers-representation-and-manipulation
    3 主题
  29. protocols
    2 主题
  30. circuit-switching-packet-switching
    1 主题
  31. processors-parallel-processing-and-virtual-machines
    5 主题
  32. boolean-algebra-and-logic-circuits
    4 主题
  33. purposes-of-an-operating-system-os
    3 主题
  34. translation-software
    3 主题
  35. encryption-encryption-protocols-and-digital-certificates
    3 主题
  36. artificial-intelligence-ai
    4 主题
  37. recursion
    1 主题
  38. programming-paradigms
    4 主题
  39. object-oriented-programming
    7 主题
  40. file-processing-and-exception-handling
    2 主题
  41. data-representation
    5 主题
  42. multimedia
    3 主题
  43. compression
    2 主题
  44. networks-and-the-internet
    11 主题
课 Progress
0% Complete

Digital certificates

What is a digital certificate?

  • A digital certificate is an electronic file that confirms someone’s identity and proves that a public key belongs to them

  • It is issued by a trusted third party called a Certificate Authority (CA)

  • A digital certificate includes:

    • The owner’s public key

    • The owner’s identity details (e.g. name, email, company)

    • The expiry date of the certificate

    • The Certificate Authority’s digital signature

Hash function

  • A hash function is a one-way algorithm that takes an input (e.g. a message) and produces a fixed-length output, called a hash value or message-digest

  • Key features:

    • The output is always the same length, regardless of input size

    • It is one-way — you cannot reverse it to get the original input

    • Even a small change in input produces a completely different output

    • Commonly used in digital signatures and password storage

  • Think of it as a fingerprint for data

Message-digest

  • A message-digest is the output (the hash value) produced when a message is processed through a hash function

  • It is:

    • A fixed-length summary of the original message

    • Unique to the message (ideally – collisions are rare)

    • Used to check whether a message has been altered

  • Think of it as the unique ID or checksum of a message

How is a digital certificate acquired?

  1. Leila wants to be able to sign documents digitally

  2. She generates a key pair – one private key and one public key

  3. Leila sends a Certificate Signing Request (CSR) to a Certificate Authority (CA)

    1. This includes her public key and identity details

  4. The CA verifies Leila’s identity using documents or other checks

  5. If approved, the CA digitally signs a certificate and sends it back to Leila

    1. This certificate contains Leila’s public key, identity, and the CA’s signature

How is a digital certificate used to produce a digital signature?

  1. Leila writes a message she wants to send to Jonas

  2. She applies a hash function to the message to create a message-digest

  3. Leila then encrypts the message-digest using her private key

    1. This becomes her digital signature

  4. She sends Jonas:

    • The original message

    • Her digital signature

    • Her digital certificate

  5. Jonas:

    • Uses Leila’s public key (from the certificate) to verify the digital signature

    • Uses the CA’s public key to verify that the certificate is genuine and hasn’t been forged

Summary

Step

Purpose

Certificate issued by a CA

Proves the public key belongs to the sender

Certificate includes public key

Lets others verify digital signatures

CA’s digital signature on certificate

Shows it was issued by a trusted third party

Public verifies sender and message

Ensures authenticity and integrity of the message

Examiner Tips and Tricks

  • The digital certificate proves ownership of a public key

  • The digital signature proves a message came from the claimed sender and wasn’t altered

Don’t mix them up!

Responses

您的邮箱地址不会被公开。 必填项已用 * 标注