Digital certificates, Computer Network Security


A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate. This is done with authenticating the owner through trusted 3rd parties named the certificate authorities (CA) e.g. Verisign etc. The Authorities digitally signs these certificates. When the user represents the certificate the recipient checks it by using the digital signature.

Distributing the owner's public key to his/her users (or recipients of the message).The server certificates let visitors to your website interchange personal information like credit card number etc with the server with the confidence that they are interacting with intended site and not the rogue site impersonating the intended site.



Posted Date: 7/27/2012 6:07:16 AM | Location : United States

Related Discussions:- Digital certificates, Assignment Help, Ask Question on Digital certificates, Get Answer, Expert's Help, Digital certificates Discussions

Write discussion on Digital certificates
Your posts are moderated
Related Questions
(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

All references using actual quotes, paraphrase, or specific arguments, should employ page numbers. The essay is based on the unit content and should engage with the set readings, a

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

I need a help on how to write good assignment on the above topic

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send