Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

X.509

  • Runs on chain of trust
  • Certificate authority -> Intermediate certificate authority -> Entity
  • Defines structure of online certificate
  • The certificate proves the authenticity of a file or user.

What is it used for

  • Certificates are issued by a trusted third party
  • Certificate authorities

How are certificates issued

  • The keys
  • The public key critical for encryption
  • Validity
  • The time period for which the certificate is valid
  • The Subject
  • The entity E.g. the website or Individual
  • The issuer
  • The certificate authority

What data does a certificate contain

  • It critical for encryption
  • It ensures data is kept safe
  • It is the median for encryption over the internet .
  • It is used to prove the safety of a website (the pad lock symbol)
  • A certificate is need to use the https domain.

Why do we need it?

  • Development began in early 1980s along with the development of public key infrastructure.
  • It became needed when the internet began to grow in the 1990s, when it was adopted as the formal standard.
  • It is still used a lot today in many cases.
e.g. HTTPS, email encryption, VPN authentication and code signing

A brief history