So far we have briefly illustrated the theory behind the Digital Certificate and its role in the deliverance of PKI. The following pages now look at the practicalities of using a Digital Certificate, where to find them on your PC, and what they actually look like.
Using Digital Certificates to deliver the 5 primary security functions
The CA attests to the identity of the Certificate applicant when it signs the Digital Certificate.
The Public Key within the Digital Certificate is used to encrypt data to ensure that only the intended recipient can decrypt and read it.
By Digitally Signing the message or data, the recipient has a means of identifying any tampering made on the signed message or data.
A signed message proves origin, as only the sender has access to the Private Key used to sign the data.
Access Control may be achieved through use of the Digital Certificate for identification (and hence the replacement of passwords etc). Additionally, as data can be encrypted for specific individuals, we can ensure that only the intended individuals gain access to the information within the encrypted data.