Yes, it's time to add on another post about SSL certificates. I suppose I could have gone back through all of the posts and corrected the titles to "Part x of 4," But, in the spirit of Douglas Adams, whose...
Tag: SSL
Compelled Certificate Creation Attacks
Last October, we published a three-part series on SSL certificates: what they are, how they work, and how they’re used to secure transactions over the Web. You’ll find the series listed in our “Security” category. For most of us, this...
SSL and Certificates – Part 3 of 3
Part 1 and Part 2 of this series covered the basic cryptographic concepts behind SSL certificates, and looked at how an SSL certificate is constructed and how it is validated. This installment will discuss what different kinds of certificates exist,...
SSL and Certificates – Part 2 of 3
In Part 1, we discussed basic cryptography, and worked our way up to symmetrical encryption systems such as AES, which accepts key lengths as long as 256 bits. We also discussed why key length was important to a cryptosystem, and...
SSL and Certificates – Part 1 of 3
There has been a lot of confusion regarding what SSL certificates are all about – what they are, what they do, how you use them to secure a Web site, what the “gotchas” are when you’re trying to set up...