digital certificate

Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms.

digital certificate

(communications, security)
An attachment to an electronic mail message used for security purposes, e.g. to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply.

An individual wishing to send an encrypted message applies for a digital certificate from a certificate authority (CA). The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available on the Internet.

The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate.
This article is provided by FOLDOC - Free Online Dictionary of Computing (

digital certificate

The digital equivalent of an ID card used in conjunction with a public key encryption system. Also called a "digital ID," "digital identity certificate," "identity certificate" and "public key certificate," digital certificates are issued by a trusted third party known as a "certification authority" (CA) such as VeriSign ( and Thawte (

The CA verifies that a public key belongs to a specific company or individual (the "subject"), and the validation process it goes through to determine if the subject is who it claims to be depends on the level of certification and the CA itself.

Creating the Certificate
After the validation process is completed, the CA creates an X.509 certificate that contains CA and subject information, including the subject's public key (details below). The CA signs the certificate by creating a digest (a hash) of all the fields in the certificate and encrypting the hash value with its private key. The encrypted digest is called a "digital signature," and when placed into the X.509 certificate, the certificate is said to be "signed."

The CA keeps its private key very secure, because if ever discovered, false certificates could be created. See HSM.

Verifying the Certificate
The process of verifying the "signed certificate" is done by the recipient's software, which is typically the Web browser. The browser maintains an internal list of popular CAs and their public keys and uses the appropriate public key to decrypt the signature back into the digest. It then recomputes its own digest from the plain text in the certificate and compares the two. If both digests match, the integrity of the certificate is verified (it was not tampered with), and the public key in the certificate is assumed to be the valid public key of the subject.

Then What...
At this point, the subject's identity and the certificate's integrity (no tampering) have been verified. The certificate is typically combined with a signed message or signed executable file, and the public key is used to verify the signatures (see digital signature and code signing). The subject's public key may also be used to provide a secure key exchange in order to have an encrypted two-way communications session (see SSL). See PKI.

Major Data Elements in an X.509 Certificate

 Version number of certificate format
 Serial number (unique number from CA)
 Certificate signature algorithm
 Issuer (name of CA)
 Valid-from/valid-to dates
 Subject (name of company or person certified)
 Subject's public key and algorithm
 Digital signature created with CA's private key

Signing and Verifying a Digital Certificate
The signed certificate is used to verify the identity of a person or organization.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Security experts agree that the issue comes down to accountability, and that CA's face no serious repercussions for a lack of due diligence in the issuing of digital certificates.
The participants agreed that the following major issues affecting the acceptance, use, and comparability of digital certificates need resolution:
Digital certificates are also finding a role in cutting-edge electronic healthcare technology.
Since 2002 has been helping to secure clients with digital certificates and five-star customer service.
When a company wants a digital certificate, it sends its public key and identifying information to a certificate authority.
Explorer fails to check the validity of digital certificates used to prove the identity of Web sites, allowing for an 'undetected, man in the middle attack,' he added.
Secured socket layer (SSL), a technology that uses digital certificates, is found in hundreds of Web sites providing security for electronic transactions.
In order to apply for a digital certificate, you must submit personal information to a certificate authority, much like you would when you apply for a credit card.
In a public key infrastructure, a trusted entity called a certificate authority manages the creation and use of key pairs and digital certificates, which are the public representation of a person's digital identity.
Entegrity TSP is designed to provide Identrus member financial institutions and their corporate customers with products and services that allow the rapid and cost-effective integration of strong security and digital certificates into the Identrus e-commerce trust infrastructure.
The four key components of a trusted digital certificate system are confidentiality, authentication, integrity, and nonrepudiation, or CAIN.
has launched ISARA Catalyst Agile Digital Certificate Technology, a first-of-its-kind technology that allows organizations and manufacturers to secure their infrastructure and connected devices from the looming threat of an encryption-breaking quantum computer.

Full browser ?