{"id":2245,"date":"2022-03-21T14:21:33","date_gmt":"2022-03-21T14:21:33","guid":{"rendered":"http:\/\/learnlearn.uk\/alevelcs\/?page_id=2245"},"modified":"2022-03-30T16:34:09","modified_gmt":"2022-03-30T16:34:09","slug":"digital-certificates","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/","title":{"rendered":"Digital Signatures &#038; Certificates"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Digital Certificates<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Digital Certificates<\/h3>\n<p>One of the limitations of asymmetric encryption is that when used on its own, it is vulnerable to a man-in-the-middle attack. It is possible for an attacker to intercept the asymmetric handshake process and fool the sender and receiver into thinking they are sending secure messages. This is because although asymmetric encryption ensures secure transfer of data between two parties it does not itself ensure authentication of the identity of the parties involved. In order to ensure authentication asymmetric encryption needs to be used in conjunction with a digital certificate issued by a trustworthy certificate authority.<\/p>\n<p>When an entity (such as a website) wants to apply for a digital certificate they send their public key, along with other details, to the certificate authority(CA). The CA then sends a signed copy of the digital certificate back to the entity.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Verification  Process<\/h2>\n<div class=\"tabcontent\">\n\n<h3><strong>Certificate verification process (for a website)<\/strong><\/h3>\n<p><strong>Step 1 &#8211; Certificate Requested<\/strong><\/p>\n<p>The user&#8217;s browser sends a message to the website server, requesting the digital certificate.<\/p>\n<p><strong>Step 2 &#8211; Certificate Sent<\/strong><\/p>\n<p>The website sends a copy of the digital certificate to the user.<\/p>\n<p><strong>Step 3 &#8211; Certificate Authenticated<\/strong><\/p>\n<p>The user&#8217;s browser verifies the validity of the certificate using the public key of the CA. Most web browsers have a preinstall cache of the public keys of trusted Certificate Authorities. The public key stored on the browser is used to verify the hash digest of the certificate.<\/p>\n<p><strong>Step 4 &#8211; Communication Begins<\/strong><\/p>\n<p>The user&#8217;s browser uses the public key provided within the authenticated certificate to perform asymmetric encryption on the symmetric shared key and sends the encrypted symmetric key to the website. Since only the website know the corresponding private key, only the legitimate website can decrypt the encrypted symmetric key and therefore\u00a0 communication can be considered secure and authenticated.<\/p>\n<p><strong>Contents of a Digital Certificate<\/strong><\/p>\n<ul>\n<li>Name of the Owner &#8211; A unique identifier for that particular owner<\/li>\n<li>Public Key of the owner<\/li>\n<li>Issue Date of the certificate<\/li>\n<li>Expiry Date<\/li>\n<li>The Name of the Certificate Authority<\/li>\n<li>Digital Certificate of the Certificate Authority (This is a hash of the above items, generated using the CA&#8217;s private key.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Digital Certificates Video<\/strong><\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=UbMlPIgzTxc\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Why digital certificate?\" title=\"Play video &quot;Why digital certificate?&quot;\">https:\/\/www.youtube.com\/watch?v=UbMlPIgzTxc<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=UbMlPIgzTxc\" title=\"Why digital certificate?\">Why digital certificate? (https:\/\/www.youtube.com\/watch?v=UbMlPIgzTxc)<\/a><\/noscript><\/div>\n<\/div>\n<p><strong>SSL Certificates Video<\/strong><\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=33VYnE7Bzpk\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"How SSL certificate works?\" title=\"Play video &quot;How SSL certificate works?&quot;\">https:\/\/www.youtube.com\/watch?v=33VYnE7Bzpk<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=33VYnE7Bzpk\" title=\"How SSL certificate works?\">How SSL certificate works? (https:\/\/www.youtube.com\/watch?v=33VYnE7Bzpk)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Digital Signatures<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Digital Signatures<\/h3>\n<p>&nbsp;<\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=TmA2QWSLSPg\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"What is digital signature?\" title=\"Play video &quot;What is digital signature?&quot;\">https:\/\/www.youtube.com\/watch?v=TmA2QWSLSPg<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=TmA2QWSLSPg\" title=\"What is digital signature?\">What is digital signature? (https:\/\/www.youtube.com\/watch?v=TmA2QWSLSPg)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Resources<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Past Paper Questions<\/h3>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2021-may-june-9608-s21-qp-32-pdf\">May June 21 Question 7 Paper 32<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-may-june-2020-9608-s20-qp-31-pdf\">Summer 2020 Paper 31 &#8211; Question 8<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2019-oct-nov-9608-w19-qp-32-pdf\">Winter 2019 Paper 32 &#8211; Question 1<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2017-jun-9608-s17-qp-32-pdf\">Summer 2017 Paper 32 &#8211; Question 2c<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2016-jun-9608-s16-qp-31-pdf\">Summer 2016 Paper 31 &#8211; Question 2<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-advanced-as-and-a-level-computer-science-9608-2015-jun-9608-s15-qp-31-pdf\">Summer 2015 Paper 31 &#8211; Question 2C<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Digital Certificates One of the limitations of asymmetric encryption is that when used on its own, it is vulnerable to a man-in-the-middle attack. It is possible for an attacker to intercept the asymmetric handshake process and fool the sender and receiver into thinking they are sending secure messages. This is because although asymmetric encryption ensures&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Digital Signatures &#038; Certificates<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Signatures &amp; Certificates - A Level Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Signatures &amp; Certificates - A Level Computer Science\" \/>\n<meta property=\"og:description\" content=\"Digital Certificates One of the limitations of asymmetric encryption is that when used on its own, it is vulnerable to a man-in-the-middle attack. It is possible for an attacker to intercept the asymmetric handshake process and fool the sender and receiver into thinking they are sending secure messages. This is because although asymmetric encryption ensures&hellip;&nbsp;Read More &raquo;Digital Signatures &#038; Certificates\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/\" \/>\n<meta property=\"og:site_name\" content=\"A Level Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-30T16:34:09+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/\",\"name\":\"Digital Signatures & Certificates - A Level Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#website\"},\"datePublished\":\"2022-03-21T14:21:33+00:00\",\"dateModified\":\"2022-03-30T16:34:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"A Level Computer Science Home\",\"item\":\"https:\/\/learnlearn.uk\/alevelcs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Signatures &#038; Certificates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/\",\"name\":\"A Level Computer Science\",\"description\":\"CIE Specification\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/alevelcs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#organization\",\"name\":\"A Level Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"A Level Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Signatures & Certificates - A Level Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/","og_locale":"en_GB","og_type":"article","og_title":"Digital Signatures & Certificates - A Level Computer Science","og_description":"Digital Certificates One of the limitations of asymmetric encryption is that when used on its own, it is vulnerable to a man-in-the-middle attack. It is possible for an attacker to intercept the asymmetric handshake process and fool the sender and receiver into thinking they are sending secure messages. This is because although asymmetric encryption ensures&hellip;&nbsp;Read More &raquo;Digital Signatures &#038; Certificates","og_url":"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/","og_site_name":"A Level Computer Science","article_modified_time":"2022-03-30T16:34:09+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/","url":"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/","name":"Digital Signatures & Certificates - A Level Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#website"},"datePublished":"2022-03-21T14:21:33+00:00","dateModified":"2022-03-30T16:34:09+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/alevelcs\/digital-certificates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"A Level Computer Science Home","item":"https:\/\/learnlearn.uk\/alevelcs\/"},{"@type":"ListItem","position":2,"name":"Digital Signatures &#038; Certificates"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/alevelcs\/#website","url":"https:\/\/learnlearn.uk\/alevelcs\/","name":"A Level Computer Science","description":"CIE Specification","publisher":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/alevelcs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/alevelcs\/#organization","name":"A Level Computer Science","url":"https:\/\/learnlearn.uk\/alevelcs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"A Level Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/alevelcs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Digital Certificates One of the limitations of asymmetric encryption is that when used on its own, it is vulnerable to a man-in-the-middle attack. It is possible for an attacker to intercept the asymmetric handshake process and fool the sender and receiver into thinking they are sending secure messages. This is because although asymmetric encryption ensures&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/2245"}],"collection":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/comments?post=2245"}],"version-history":[{"count":9,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/2245\/revisions"}],"predecessor-version":[{"id":2281,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/2245\/revisions\/2281"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/media?parent=2245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}