You are on page 1of 8

Network and Information Security (22620)

Practical No. 13 : Create and verify Digital Certificate using tool (e.g.
Cryptool)

I Practical significance

Digital certificates are typically issued by a certificate authority (CA), which is a trusted third-party entity
that issues digital certificates for use by other parties. ... Digital certificates make it possible
for digital signatures to be used as a way to authenticate digital information. Digital certificates include the
public key being certified, identifying information about the entity that owns the public key, metadata
relating to the digital certificate and a digital signature of the public key created by the issuer of
the certificate. A digital certificate is an electronic document issued by a Certificate Authority (CA). It
contains the public key for a digital signature and specifies the identity associated with the key, such as the
name of an organization. The certificate is used to confirm that the public key belongs to the specific
organization.

II Relevant Program Outcome (POs)


PO1 – Basic knowledge
PO2 – Discipline knowledge
PO3 – Experiments and practice
PO4 – Life-long learning

III Competency and practical Skills


“Understand about the Digital Certificate”
This practical is expected to develop the following skills :
1. We have to learn about creating digital certificate using tool.
2. We have to learn about verifying digital certificate.

IV Relevant Course Outcome(s)


Create and verify Digital Certificate using tool

V Practical outcomes
Information for creating digital certificate.

VI Relevant Affective Domain Related Outcomes


a. Follow precautionary measures
b. Demonstrate working as a leader / a team member
c. Follow ethical practices

Page | 1
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

VII Minimum Theoretical Background

A certificate is an electronic document that is used to identify an individual, a server, a company, or some
other entity, and to associate that identity with a public key. Like a driver's license, a passport, a student
ID, a library card, or other commonly used personal IDs, a certificate provides generally recognized proof
of a person's identity. Certificates use public key cryptography to address the problem of impersonation.
To obtain a driver's license, you typically apply to the Department of Motor Vehicles, which verifies your
identity, your ability to drive, your address, and other pertinent information before issuing you a driver's
license. To obtain a student ID, you apply to a school or college that, in turn, performs different checks
(such as whether you paid your tuition) before issuing the student ID. To obtain a library card, you may
only need to provide your name and a utility bill with your address on it. Certificates work much the same
way as any of the previously mentioned forms of identification. Certificate authorities (CAs) are entities
that validate identities and issue certificates. Clients and servers use certificates issued by the CA to
determine the other certificates that can be trusted. Just like the methods to validate other forms of
identification can vary depending on who is issuing the ID and the purpose for which it is being used, the
methods used to validate an identity can vary depending on the policies of a given CA.

VIII Work situation


a. Faculty must form a group of students.
b. Faculty will demonstrate the use of cryptool.
c. Students group will use the tool

IX Precaution to be followed
1. Handle computer system and peripherals with care
2. Handle software carefully
3. Follow safety precautions
4. Disconnect PCs from these cables and shut down properly

Page | 2
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

X Procedure

Steps to install Digital Certificate in any operating system: -

1. When the Certificate Import Wizard starts, you will see the Welcome Screen (seen below). At
this screen, you can click on the Next button.

2. Next you will brought to the File to Import screen. By default, the Import Wizard has
alreadyselected the location of the file that you are going to install. Click on Next.

Page | 3
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

3. At the next screen, you will be required to enter in your password for the certificate. If you do
notknow what your password is to your QuoVadis certificate, please contact QuoVadis Support

4. After entering in your password, you will see that you have three check-boxes. These are optional,
however you may want to check them depending on if you would like any additional features and
security. Please refer to the points below to see what each do:

 Enable strong private key protection - If you check this then every time you try to access your
certificate, you will be prompted for a password that is set by you.
 Mark this key as exportable - This will allow you to export your certificate later into a .pfx
file. You will be allowed to change the password
 Include all extended properties - Should be checked. After
you have selected your options and you have entered in the password, click onthe Next button
5. The next screen will be the Certificate Store selection screen. As you are installing a .p12 or .pfx
file, you can leave the default as Automatically select the certificate store based on the type of
certificate. Click on Next.

Page | 4
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

6. At the next screen, you will receive a summary of some of the options that you have chosen.
Whenyou are ready, click on Finish at the bottom.

7. You will then receive a small window that confirms the installation of the certificate. When
youare finished, click on the OK button.

Page | 5
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

Output Of Digital Certificate:

Page | 6
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

Page | 7
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati
Network and Information Security (22620)

List of student Team Members

1.
2.
3.
4.

Signature ofTeacher

Page | 8
By Prof.R.H.Rathod, Comp.Engg. Deptt., Dr.Panjabrao Deshmukh Polytechnic, Amravati

You might also like