Glossary
Certificate | A certificate is a digital document that is used to verify the identity of a person, organization, or device. It contains information such as the public key of the entity it represents, and is used to sign and authenticate digital transactions. |
---|---|
Certificate algorithm | The certificate algorithm is the mathematical function used to create the digital signature that verifies the authenticity of the certificate. Common algorithms include RSA, DSA, and ECDSA. |
Certificate public key | The certificate public key is the key used to encrypt messages and verify digital signatures associated with the certificate. It is typically included in the certificate and can be used by anyone to verify the authenticity of the certificate. |
Certificate serial number | A certificate serial number is a unique identifier assigned to a digital certificate by the certificate authority (CA) that issued it. It is used to distinguish one certificate from another and is an important component in verifying the authenticity of the certificate. |
Certificate signature | The certificate signature is a digital signature created by the certificate authority (CA) to verify the authenticity of the certificate. It is generated using the private key of the CA and can be verified using the public key included in the certificate. |
Certificate version | The certificate version identifies the format and structure of a digital certificate. The current version is X.509, which is widely used for secure communications on the internet. |
Common name | The common name is a field in a digital certificate that identifies the entity or organization to which the certificate was issued. It is typically a domain name or an email address. |
Hash algorithm | A hash algorithm, also known as a hash function, is a mathematical function that takes an input (such as a file or message) and produces a fixed-size output (the hashcode). The output is typically a unique, pseudo-random number that can be used to verify the integrity of the input data. |
Hashcode (or hash, or fingerprint) | A hashcode is a unique digital fingerprint generated by applying a mathematical function to a file or piece of data. This fingerprint is typically a fixed length and is used to identify the data without revealing its contents. |
Nonce | A nonce is a random number that is used only once in a cryptographic communication to prevent replay attacks. It is typically generated by the sender and included in the message, and then verified by the receiver to ensure that the message has not been tampered with. |
Policy OID | A policy OID (Object Identifier) is a unique identifier used to define the policies and procedures associated with a digital certificate. It is typically included in the certificate and can be used to verify that the certificate meets the necessary security requirements. |
Restamping | Restamping is the process of creating a new timestamp for a document or transaction that already has a timestamp. This can be done periodically to ensure the validity of the timestamp over time. |
Subject alternative names (SAN) | Subject alternative names are additional identifiers that can be included in a digital certificate to specify other domains or email addresses that the certificate is valid for. This is particularly useful for multi-domain or wildcard certificates. |
Timestamp | A timestamp is a digital record of the exact date and time when a specific event occurred, such as the creation or modification of a document or transaction. |
Timestamp accuracy | Timestamp accuracy refers to the degree of precision with which a timestamp indicates the exact time at which data was created or modified. A high degree of accuracy is important in legal and regulatory contexts where the timing of events is critical. |
Timestamp request file | A timestamp request file is a file that contains a hashcode and other information about the data it represents. It is used to request a timestamp from a trusted timestamping authority (TSA) to prove that the data existed at a specific point in time. |
Timestamp response file | A timestamp response file is a file that contains a timestamp and other information about the data it represents. It is generated by a trusted timestamping authority in response to a timestamp request file, and can be used to prove the existence of the data at a specific point in time. |
Timestamp Service Authority (TSA) | A TSA is a trusted third-party service that provides timestamping services to users. It issues timestamps and signs them with a digital certificate to ensure their authenticity and integrity. |
Timestamp token serial number | A timestamp token serial number is a unique identifier assigned to a digital certificate used for timestamping. It is typically used to verify the authenticity of a timestamp and ensure that it was generated by a trusted authority |