Professional Documents
Culture Documents
Practical No. 13 : Create and verify Digital Certificate using tool (e.g.
Cryptool)
I Practical significance
Digital certificates are typically issued by a certificate authority (CA), which is a trusted third-party entity
that issues digital certificates for use by other parties. ... Digital certificates make it possible
for digital signatures to be used as a way to authenticate digital information. Digital certificates include the
public key being certified, identifying information about the entity that owns the public key, metadata
relating to the digital certificate and a digital signature of the public key created by the issuer of
the certificate. A digital certificate is an electronic document issued by a Certificate Authority (CA). It
contains the public key for a digital signature and specifies the identity associated with the key, such as the
name of an organization. The certificate is used to confirm that the public key belongs to the specific
organization.
V Practical outcomes
Information for creating digital certificate.
Page | 1
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)
A certificate is an electronic document that is used to identify an individual, a server, a company, or some
other entity, and to associate that identity with a public key. Like a driver's license, a passport, a student
ID, a library card, or other commonly used personal IDs, a certificate provides generally recognized proof
of a person's identity. Certificates use public key cryptography to address the problem of impersonation.
To obtain a driver's license, you typically apply to the Department of Motor Vehicles, which verifies your
identity, your ability to drive, your address, and other pertinent information before issuing you a driver's
license. To obtain a student ID, you apply to a school or college that, in turn, performs different checks
(such as whether you paid your tuition) before issuing the student ID. To obtain a library card, you may
only need to provide your name and a utility bill with your address on it. Certificates work much the same
way as any of the previously mentioned forms of identification. Certificate authorities (CAs) are entities
that validate identities and issue certificates. Clients and servers use certificates issued by the CA to
determine the other certificates that can be trusted. Just like the methods to validate other forms of
identification can vary depending on who is issuing the ID and the purpose for which it is being used, the
methods used to validate an identity can vary depending on the policies of a given CA.
IX Precaution to be followed
1. Handle computer system and peripherals with care
2. Handle software carefully
3. Follow safety precautions
4. Disconnect PCs from these cables and shut down properly
Page | 2
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)
X Procedure
1. When the Certificate Import Wizard starts, you will see the Welcome Screen (seen below). At
this screen, you can click on the Next button.
2. Next you will brought to the File to Import screen. By default, the Import Wizard has
alreadyselected the location of the file that you are going to install. Click on Next.
Page | 3
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)
3. At the next screen, you will be required to enter in your password for the certificate. If you do
notknow what your password is to your QuoVadis certificate, please contact QuoVadis Support
4. After entering in your password, you will see that you have three check-boxes. These are optional,
however you may want to check them depending on if you would like any additional features and
security. Please refer to the points below to see what each do:
Enable strong private key protection - If you check this then every time you try to access your
certificate, you will be prompted for a password that is set by you.
Mark this key as exportable - This will allow you to export your certificate later into a .pfx
file. You will be allowed to change the password
Include all extended properties - Should be checked. After
you have selected your options and you have entered in the password, click onthe Next button
5. The next screen will be the Certificate Store selection screen. As you are installing a .p12 or .pfx
file, you can leave the default as Automatically select the certificate store based on the type of
certificate. Click on Next.
Page | 4
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)
6. At the next screen, you will receive a summary of some of the options that you have chosen.
Whenyou are ready, click on Finish at the bottom.
7. You will then receive a small window that confirms the installation of the certificate. When
youare finished, click on the OK button.
Page | 5
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)
Page | 6
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)
Page | 7
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)
1.
2.
3.
4.
Signature ofTeacher
Page | 8
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati