What is digital certificate?

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn16

The most common use of a digital certificate is to validate that a user sending a message is who he or she claims to be and to provide the receiver with the means to encode a reply. Certificate authentication uses public key cryptography and a digital certificate to authenticate a user. Certificate authentication can be used in addition to other password-based authenticated schemes to provide stronger security.

The use of certificates is considered an implementation of two-factor authentication. In addition to something you know (your password), you must authenticate with something you have (your certificate). Certificates can be stored in hardware (e.g., smart cards) to provide an even higher level of security—possession of a physical token and availability of an appropriate smart card reader would be required to access a site protected in such a manner.

Client certificates provide stronger security, however, at a cost. The difficulty of obtaining certificates, distributing certificates, and managing certificates for the client base makes this authentication method prohibitively expensive for large sites. However, sites that have very sensitive data or a limited user base, as is common with business-tobusiness (B2B) applications, would benefit greatly from the use of certificates.

There are no current known attacks against certificate-based authentication, given the private certificate remains protected. However, systems that fail to check the validity of certificates based on certificate revocation lists (CRLs) may improperly permit the use of a revoked stolen certificate. Of course, if an attacker is able to compromise the PKI (public key infrastructure) infrastructure itself, then bypassing normal certificate authentication controls may be possible.

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn16

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Leave a Reply