Computer-science_A-level_Cie
-
computers-and-components6 主题
-
logic-gates-and-logic-circuits2 主题
-
central-processing-unit-cpu-architecture6 主题
-
assembly-language-4 主题
-
bit-manipulation1 主题
-
operating-systems3 主题
-
language-translators2 主题
-
data-security3 主题
-
data-integrity1 主题
-
ethics-and-ownership3 主题
-
database-concepts3 主题
-
database-management-systems-dbms-1 主题
-
data-definition-language-ddl-and-data-manipulation-language-dml1 主题
-
computational-thinking-skills1 主题
-
algorithms14 主题
-
data-types-and-records2 主题
-
arrays2 主题
-
files1 主题
-
introduction-to-abstract-data-types-adt1 主题
-
programming-basics1 主题
-
constructs2 主题
-
structured-programming1 主题
-
program-development-life-cycle2 主题
-
program-design-2 主题
-
program-testing-and-maintenance3 主题
-
user-defined-data-types1 主题
-
file-organisation-and-access-3 主题
-
floating-point-numbers-representation-and-manipulation3 主题
-
protocols2 主题
-
circuit-switching-packet-switching1 主题
-
processors-parallel-processing-and-virtual-machines5 主题
-
boolean-algebra-and-logic-circuits4 主题
-
purposes-of-an-operating-system-os3 主题
-
translation-software3 主题
-
encryption-encryption-protocols-and-digital-certificates3 主题
-
artificial-intelligence-ai4 主题
-
recursion1 主题
-
programming-paradigms4 主题
-
object-oriented-programming7 主题
-
file-processing-and-exception-handling2 主题
-
data-representation5 主题
-
multimedia3 主题
-
compression2 主题
-
networks-and-the-internet11 主题
digital-certificates
Digital certificates
What is a digital certificate?
-
A digital certificate is an electronic file that confirms someone’s identity and proves that a public key belongs to them
-
It is issued by a trusted third party called a Certificate Authority (CA)
-
A digital certificate includes:
-
The owner’s public key
-
The owner’s identity details (e.g. name, email, company)
-
The expiry date of the certificate
-
The Certificate Authority’s digital signature
-
Hash function
-
A hash function is a one-way algorithm that takes an input (e.g. a message) and produces a fixed-length output, called a hash value or message-digest
-
Key features:
-
The output is always the same length, regardless of input size
-
It is one-way — you cannot reverse it to get the original input
-
Even a small change in input produces a completely different output
-
Commonly used in digital signatures and password storage
-
-
Think of it as a fingerprint for data
Message-digest
-
A message-digest is the output (the hash value) produced when a message is processed through a hash function
-
It is:
-
A fixed-length summary of the original message
-
Unique to the message (ideally – collisions are rare)
-
Used to check whether a message has been altered
-
-
Think of it as the unique ID or checksum of a message
How is a digital certificate acquired?
-
Leila wants to be able to sign documents digitally
-
She generates a key pair – one private key and one public key
-
Leila sends a Certificate Signing Request (CSR) to a Certificate Authority (CA)
-
This includes her public key and identity details
-
-
The CA verifies Leila’s identity using documents or other checks
-
If approved, the CA digitally signs a certificate and sends it back to Leila
-
This certificate contains Leila’s public key, identity, and the CA’s signature
-
How is a digital certificate used to produce a digital signature?
-
Leila writes a message she wants to send to Jonas
-
She applies a hash function to the message to create a message-digest
-
Leila then encrypts the message-digest using her private key
-
This becomes her digital signature
-
-
She sends Jonas:
-
The original message
-
Her digital signature
-
Her digital certificate
-
-
Jonas:
-
Uses Leila’s public key (from the certificate) to verify the digital signature
-
Uses the CA’s public key to verify that the certificate is genuine and hasn’t been forged
-
Summary
|
Step |
Purpose |
|---|---|
|
Certificate issued by a CA |
Proves the public key belongs to the sender |
|
Certificate includes public key |
Lets others verify digital signatures |
|
CA’s digital signature on certificate |
Shows it was issued by a trusted third party |
|
Public verifies sender and message |
Ensures authenticity and integrity of the message |
Examiner Tips and Tricks
-
The digital certificate proves ownership of a public key
-
The digital signature proves a message came from the claimed sender and wasn’t altered
Don’t mix them up!
Responses