Cambridge A-Level Computer Science 9618 – Encryption, Encryption Protocols and Digital Certificates
17.1 Encryption, Encryption Protocols and Digital Certificates
Objective
Show understanding of digital certification – what it is, why it is needed, how it works and how it is managed in practice.
What is a Digital Certificate?
A digital certificate is an electronic document that binds a public key to an entity (person, organisation or device) and is issued by a trusted third party called a Certificate Authority (CA). It provides:
Authentication – proves the identity of the holder.
Integrity – ensures the public key has not been altered.
Non‑repudiation – the holder cannot deny having used the key.
Key Components of a Public Key Infrastructure (PKI)
Certificate Authority (CA) – issues, signs and revokes certificates.
Registration Authority (RA) – verifies the identity of the applicant before the CA issues a certificate.
Certificate Repository – stores issued certificates and revocation information.
Certificate Revocation List (CRL) – a list of certificates that have been revoked before expiry.
Online Certificate Status Protocol (OCSP) – provides real‑time status of a certificate.
Structure of a Digital Certificate
The most common format is X.509. The table below summarises the main fields.
Field
Description
Version
Indicates the X.509 version (v1, v2, v3). v3 adds extensions.
Serial Number
Unique identifier assigned by the CA.
Signature Algorithm
Algorithm used by the CA to sign the certificate (e.g., SHA‑256 with RSA).
Issuer
Distinguished Name (DN) of the CA that issued the certificate.
Validity Period
Start and end dates/times for which the certificate is valid.
Subject
DN of the entity to which the certificate is issued.
Subject Public Key Info
Public key and algorithm belonging to the subject.
Extensions (v3 only)
Additional data such as Key Usage, Subject Alternative Name, CRL Distribution Points.
Signature \cdot alue
Digital signature created by the CA over the certificate contents.
Certificate Lifecycle
Key Pair Generation – The applicant creates a public/private key pair.
Certificate Signing Request (CSR) – Contains the public key and subject details, signed with the applicant’s private key.
Verification by RA – The RA checks the applicant’s identity.
Certificate Issuance – CA signs the CSR, producing the digital certificate.
Distribution – Certificate is installed on the server/device or sent to the client.
Validation – During a connection, the peer validates the certificate chain and checks revocation status.
Renewal or Revocation – Before expiry the certificate can be renewed; if compromised it is revoked.
How \cdot alidation Works – Example with HTTPS
When a web browser connects to an HTTPS site, the following steps occur:
The server sends its X.509 certificate to the browser.
The browser builds a certificate chain from the server’s certificate up to a trusted root CA.
where \$Ci\$ is a certificate and \$C{i+1}\$ is its issuer.
The browser checks the validity period and that the domain name matches the Subject Alternative Name.
Revocation status is checked via CRL or OCSP.
If all checks pass, the browser trusts the public key and proceeds with the TLS handshake.
Revocation Mechanisms
CRL (Certificate Revocation List) – Periodically downloaded list of revoked serial numbers.
OCSP (Online Certificate Status Protocol) – Real‑time query to an OCSP responder for a single certificate status.
Security Considerations
Private keys must be stored securely (hardware security modules, encrypted storage).
CA compromise undermines the entire trust model – root CAs are stored in operating system or browser trust stores.
Certificate Transparency logs help detect mis‑issued certificates.
Shorter validity periods (e.g., 90 days) reduce exposure if a key is compromised.
Suggested diagram: Flow of a TLS handshake showing where the server certificate is presented and how the client validates the certificate chain, checks revocation via OCSP, and establishes a shared secret.
Key Terms Summary
Term
Definition
Public Key Infrastructure (PKI)
Framework of policies, procedures and technologies to manage digital certificates and public‑key encryption.
Certificate Authority (CA)
Trusted entity that issues and signs digital certificates.
Certificate Signing Request (CSR)
Message sent by an applicant containing its public key and identity information, signed with its private key.
Chain of Trust
Sequence of certificates from the end‑entity certificate up to a trusted root CA.
Revocation
Process of invalidating a certificate before its expiry date.
OCSP
Protocol that provides real‑time certificate status checking.
Practice Questions
Explain why a digital certificate contains both the subject’s public key and the CA’s digital signature.
Describe the steps a web browser takes to validate an HTTPS server certificate.
Compare the advantages and disadvantages of using CRL versus OCSP for revocation checking.
What could happen if a root CA’s private key is compromised? Suggest mitigation strategies.