课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Create a digital certificate

Create a digital certificate

- [Instructor] Now that you understand hash functions and digital signatures, I can explain how a certificate authority creates a digital certificate that associates a public key with an individual or organization. The process for creating digital certificates follows the X.509 standard created by the International Telecommunications Union. Therefore, you might hear digital certificates referred to as X.509 certificates. Let's say that Alice wants to obtain a new digital certificate. Alice first creates a public private key pair for the encryption algorithm of her choice. She then creates a message called a certificate signing request, or CSR. The CSR contains Alice's public key, as well as her name and other identifying information such as an email address or a server name. Alice then sends the CSR to the certificate authority of her choice. This might be an independent organization that is trusted by many people around the world, or it might be a private certificate authority…

内容