• TLS/SSL Certificate Brands
    • RapidSSL - simple site security for less. It provides basic level customer confidence with the https, closed padlock and a static trust mark.
    • A range of digital certificate and trust products enable organizations of all sizes to maximize the security of their digital transactions cost-effectively.
    • The ideal solution for enterprises and large organizations. The Internet most recognized and trusted SSL brand.
    • A quick, cost-efficient, and effective solution to build secure connection. PositiveSSL certificates show your customers you’re employing serious security measures to keep their transactions and data safe.
    • SECTIGO, formerly COMODO CA, Creating trust online for individuals, e-merchants, enterprise, with its robust SSL security.
    • i
      How organizations best manage their certificate lifecycle?


      Download E-book
  • Certificate Products
    • Single Domain SSL
      One for main domain with free 'www' coverage.
    • Wildcard SSL
      Protect unlimited sub domains under main website.
    • Multi-Domain SSL
      One certificate for multiple domain names.
    • Domain Validation SSL
      It is quick and cost-efficient, really. Basic protection.
    • Organization Validation SSL
      It gives your website an online idenity. For SMBs to strengthen web trust.
    • Extended Validation SSL
      Stand out your buiness entity, protect brand and transactions.
    • Email (Client) Certificate
      Encrypt and signed email, enable two-factor authentication, and implement strong digital trust practices throughout your organization.
    • Code Signing Certificate
      Boost Software Adoption and improve customer's trust with Code Signing. Digitally sign Code across popular platforms.
  • Domain & Email
    • Domain Name Registration
      Get your perfect domain name
    • Domain Reseller
      Reseller Pricing & TLDs
    • Transfer Domain
      Transfer domain into BestCert
    • Business Email
      Business Email builds customer trust
  • Site Builder
  • PKI Solutions
  • Partner

Home > Support > FAQ

Here are some of the frequent questions and their answers, so we list them here for your reference.

FAQ will help you quickly understand products and process.

With increasing demand and awareness of various types of online security issues, SSL/TLS encryption is always at the forefront. TLS/SSL certificate is now an essential part of any successful online business, but it can be a little overwhelming at times. Don't worry, our expert has put together with a helpful Q&A to help you understand the fundamentals of SSL certificates.

Click on the sectors below, or search any (input key words) that interests you.

General Questions and Answers SSL Certificate Validation CSR Creator and Certificate Installation SSL Certificate Renewal SSL Certificate Management
General Questions and Answers
    • What is Code Signing?
    • Code signing is the process of applying a digital signature to a software binary or file. This digital signature validates the identity of the software author or publisher and verifies that the file has not been altered or tampered with since it was signed. Code signing is an indicator to the software recipient that the code can be trusted, and it plays a pivotal role in combating malicious attempts to compromise systems or data. Use cases for code signing include software for internal or external use, patches or fixes, testing, IoT device product development, computing environments, and mobile apps. Apart from code and software, code signing also applies to applications, firmware, files, messages, XML, scripts, containers, and images.

    • Certificate Extensions Explained
    • *.PFX or *.P12 - Personal Information Exchange Format Supports storage of private and public keys and all certificates in the path. *If you wish to export a certificate and retain full private key functionality you must use the *.PFX or *.P12 extension*. *.CER or *.CRT - Base64-encoded or DER-encoded binary X.509 Certificate Storage of a single certificate. This format does not support storage of private keys. *.CRL - Certificate Revocation List Designates a certificate that has been revoked. *.CSR - Certificate Signing Request This file type is issued by applications to submit requests to a Certification Authority or CA. *.DER - DER-encoded binary X.509 Certificate Storage of a single certificate. This format does not support storage of private keys. *.P7B or *.P7R or *.SPC - Cryptographic Message Syntax Standard Supports storage of all certificates in path and does not store private keys. For technical articles from Microsoft about managing certificates on Windows Servers, check out: https://technet.microsoft.com/en-us/library/cc772898(WS.10).aspx

    • What are the Different Types of Code Signing Certificates?
    • For public trust usage, code signing certificates are available as Organization Validation (OV) or Standard Certificate and Extended Validation (EV) Certificates.

    • What are Code Signing Certificates?
    • Code Signing Certificates are generally used by software engineers or developers to digitally sign applications, drivers, software and other executables. They provide a way for end-users to verify that the code being issued has not been altered or compromised by a third party. Code Signing Certificates include your signature, your company’s name and, if desired, a timestamp.

    • What is S/MIME?
    • What is S/MIME? Secure/Multipurpose Internet Mail Extensions, or S/MIME, is an internet standard to digitally sign and encrypt email messages. It ensures the integrity of email messages remains intact while being received.

    • What are Client Certificates?
    • Client Certificates are digital certificates that identify and validate individual email senders. They are also known as Personal ID certificates, but the technical name for them is S/MIME certificates. Client certificates allow organizations to authorize or block access to apps, websites, databases and devices. They also allow individuals to sign and encrypt messages they send and receive.

    • What is a Certificate Authority (CA) and What do they do?
    • A Certificate Authority (CA) is a company or entity that has been authorized by browsers to issue TLS/SSL and other forms of certificates. These organizations undergo annual audits by third parties to ensure that they are following defined policies and procedures for validation, issuance, and revocation of certificates as laid out in the Baseline Requirements set forth by the CA/B Forum. Internet users who visit web pages not secured by CA-issued certificates will receive browser security warnings.

    • What is the Certification Authority/Browser Forum (CA/B Forum)?
    • The Certification Authority/Browser (CA/B) Forum is a voluntary group of certificate authorities (CAs), vendors of internet browser software, and suppliers of other applications that use X.509 digital certificates for TLS/SSL and code signing. Since its creation in 2005, the Forum has defined standards for the CA industry based on industry best practices. These standards, called Baseline Requirements, are a set of technical and procedural policies that must be adhered to by all public CAs, whether they are or are not members of the Forum. These standards improve the ways that TLS certificates are used, benefiting users of the internet and securing their communications.

    • What is Cryptography or a Cryptographic Algorithm?
    • Symmetric-key cryptography - Both sender and receiver share a single key and the sender uses this key to encrypt plaintext. The cipher text is sent to the receiver, and the receiver can apply this same key to decrypt the message and recover the plain text from the sender. Public-key or asymmetric cryptography –In public key cryptography (PKI), also known as asymmetric cryptography, there are two related keys called the public and private key. While the public key may be freely distributed, the paired private key must remain confidential. The public key is used for encryption and the private key is used for decryption.

    • What is Public Key Cryptography?
    • Public Key Cryptography, also known as asymmetric cryptography, uses an asymmetric algorithm to generate a pair of keys (a public and private key pair) for the purpose of encrypting and decrypting messages. Public key cryptography varies from symmetric encryption which uses one key to encrypt and decrypt. Examples of public key cryptography, or asymmetric algorithms, include: RSA, elliptic curve cryptographic systems (ECC) and Diffie-Hellman.

    • What is SSL Cryptography?
    • SSL Cryptography uses Public Key Cryptography which requires asymmetric keys to encrypt and decrypt data sent between a server and a client—typically a website and a browser, or a mail server and a mail client, like Microsoft Outlook. The history of SSL, or Secure Sockets Layer, is closely intertwined with the history of the internet. In fact, the first viable version of SSL was released as SSL 2.0 in 1995 by the internet browser Netscape and upgraded to SSL 3.0 in 1999 before being deprecated due to several vulnerabilities. Then it was replaced by TLS, or Transport Layer Security, which is now considered a more secure version of SSL. However, many people still refer to TLS (the current internet security protocol in use) as SSL, and often the terms are used interchangably. Learn more about the Evolution of TLS/SSL cryptography here. TLS/SSL cryptography and encryption is most widely used to secure websites across the internet and is the reason you see HTTPS in your browser address bar. TLS/SSL encrpytion also secures sensitive information such as credit card numbers, social security numbers, and login credentials while in transit. To establish this connection, the browser and the server need a digital certificate, also known as a TLS/SSL certificate. The technology at work behind the scenes of TLS/SSL encryption includes asymmetric and symmetric keys. These public and private keys are made up of different types of algorithms such as RSA and Elliptic Curve Cryptography (ECC), which make them virtually impossible to crack. What is Asymmetric Encryption? Asymmetric Encryption, also known as Public Key Cryptography or SSL Cryptography, uses two separate keys for encryption and decryption. With asymmetric encryption, anyone can use the public key to encrypt a message. However, decryption keys are kept private. This way only the intended recipient can decrypt the message. The most common asymmetric encryption algorithm is RSA. RSA stands for Ron Rivest, Adi Shamir, and Leonard Adleman— the men who first publicly used the algorithm in 1977. Asymmetric keys are typically 1024- or 2048-bits. However, keys smaller than 2048-bits are no longer considered safe to use. 2048-bit keys have plenty of unique encryption codes with 617 digits in use. Though larger keys can be created, the increased computational burden is so significant that keys larger than 2048 bits are rarely used. To put it into perspective, it would take an average computer more than 14 billion years to crack a 2048-bit certificate. Asymmetric Encryption Diagram What is Symmetric Encryption? Symmetric Encryption (or pre-shared key encryption) uses a single key to both encrypt and decrypt data. Both the sender and the receiver need the same key to communicate. Symmetric key sizes are typically 128 or 256 bits—the larger the key size, the harder the key is to crack. For example, a 128-bit key has 340,282,366,920,938,463,463,374,607,431,768,211,456 encryption code possibilities. As you can imagine, a ‘brute force’ attack (in which an attacker tries every possible key until they find the right one) would take quite a bit of time to break a 128-bit key. Whether a 128-bit or 256-bit key is used depends on the encryption capabilities of both the server and the client software. TLS/SSL certificates do not dictate what key size is used. Symmetric Encryption Diagram Which is Stronger: Asymmetric Keys or Symmetric Keys? Since asymmetric keys are bigger than symmetric keys, data that is encrypted asymmetrically is tougher to crack than data that is symmetrically encrypted. However, this does not mean that asymmetric keys are better. Rather than being compared by their size, these keys should be compared by the following properties: computational burden and ease of distribution. Symmetric keys are smaller than asymmetric, so they require less computational burden. However, symmetric keys also have a major disadvantage—especially if you use them for securing data transfers. Because the same key is used for symmetric encryption and decryption, both you and the recipient need the key. If you can walk over and tell your recipient the key, this isn’t a huge deal. However, if you have to send the key to a user halfway around the world (a more likely scenario) you need to worry about data security. Asymmetric encryption doesn’t have this problem. As long as you keep your private key secret, no one can decrypt your messages. You can distribute the corresponding public key without worrying who gets it. Anyone who has the public key can encrypt data, but only the person with the private key can decrypt it. How does TLS/SSL use both asymmetric and symmetric encryption? Public Key Infrastructure (PKI) is the set of hardware, software, people, policies, and procedures that are needed to create, manage, distribute, use, store, and revoke digital certificates. PKI is also what binds keys with user identities by means of a Certificate Authority (CA). PKI uses a hybrid crypto-system and benefits from using both types of encryptions. For example, in TLS/SSL communications, the server’s TLS certificate contains an asymmetric public and private key pair. The session key that the server and the browser create during the SSL Handshake is symmetric.

    • What are Public Key Encryption Algorithms?
    • Public Key Cryptography (asymmetric) uses encryption algorithms such as RSA and Elliptic Curve Cryptography (ECC) to create the public and private keys. These algorithms are based on the intractability of certain mathematical problems. Problems that can be solved in theory (e.g., given infinite time), but which in practice take too long for their solutions to be useful are known as intractable problems. With asymmetric encryption it is computationally easy to generate public and private keys, encrypt messages with the public key, and decrypt messages with the private key. However, it is extremely difficult (or impossible) for anyone to derive the private key based only on the public key.

    • What is RSA Cryptography?
    • RSA stands for Ron Rivest, Adi Shamir, and Leonard Adleman— the men who first publicly described the algorithm in 1977. RSA Cryptography is based on the presumed difficulty of factoring large integers (integer factorization). Full decryption of an RSA ciphertext is thought to be infeasible on the assumption that no efficient algorithm exists for integer factorization.

    • What is Elliptic Curve Cryptography (ECC)?
    • Elliptic Curve Cryptography (ECC) relies on the algebraic structure of elliptic curves over finite fields. It is assumed that discovering the discrete logarithm of a random elliptic curve element in connection to a publicly known base point is impractical.

    • What is Post-Quantum Cryptography?
    • Post-Quantum Cryptography (also called quantum encryption or quantum-safe encryption) is a term to describe the developing cryptographic algorithms that will use quantum computers to encrypt machine-to-machine communication.

    • What is SSL?
    • SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are protocols for establishing authenticated and encrypted machine-to-machine communications (i.e., servers on a network, laptops to webpages, mobile phones messaging each other, etc.). SSL certificates are made up of a key pair: a public and private key, which work together to establish an encrypted connection. The certificate also contains the subject name, which is the identity of the certificate/website owner.

    • What is a Digital Certificate?
    • A digital certificate authenticates the online credentials and identity of a person or organization and allows web users and recipients to know that the data they’re inputting is going to a trusted source. They are akin to security badges for websites and users and help keep the internet safe. Digital certificates are issued by Certificate Authorities (CAs) and are used to encrypt data online. Digital certificates are also known as public key certificates or identity certificates.

    • What is an Extended Validation (EV) SSL Certificate?
    • An Extended Validation (EV) Certificate is a type of TLS/SSL certificate that verifies that the certificate holder has undergone the most extensive level of vetting and identity background checks to certify that their website is authentic and legitimate. EV certificates are often required for high-profile brands, banks and other Fortune 500 companies. Extended validation means the certificate recipient and their website have completed a 16-point check to verify details such as: website domain, website owner, and the applicant’s legal, physical, and operational existence and identity.ck and blocklist checks.

    • What is a Wildcard SSL Certificate?
    • A Wildcard SSL Certificate is a single certificate with a wildcard character (*) in the domain name field. This allows the certificate to secure a single domain and multiple subdomains. For example, a Wildcard SSL Certificate for *.example.com, could be used for www.example.com, mail.example.com, store.example.com, in addition to any other subdomain name.

    • How do you Look Beyond the Lock in Web Browsers?
    • Internet users can look beyond the lock by clicking on the padlock icon in the browser URL. Once clicked on, a pop-up box will appear with another option to “Show Certificate” in Safari, click on “Certificate” and details in Google Chrome, and click on the arrow and “More Information” in Firefox. By viewing the details of a TLS/SSL certificate you can verify the domain owner’s identity or organization to ensure you’re visiting an authentic website. View a step-by-step video here: https://youtu.be/BhMb6xgnFao

    • How Long are TLS/SSL Certificate Validity Periods?
    • TLS/SSL Certificate Validity Periods are currently 398 days, or about 13 months. They were recently reduced by the CA/B Forum starting Sept. 1, 2020 in response to Apple’s announcement stating they would not accept certificates for two-year validity periods. DigiCert has instituted a 397-day validity period in order to account for time zone differences.

    • What are Site Seals or Trust Marks?
    • What are Site Seals or Trust Marks? Site Seals, also known as Trust Marks, are images that can be placed on a website to convey that the site is secure. These marks usually display the logo of the trust authority, often a technology security company, that provides the security validation. Site seals can be static or animated and may incorporate a "splash" or "information" page with details about the validated organization. Examples of site seals are the DigiCert Smart Seal, Norton Secured Seal, and Better Business Bureau's Business Accredited Seal.

    • What are CT Logs?
    • CT Logs are a publicly auditable record of TLS/SSL certificate issuance by each Certificate Authority. DigiCert was the first CA to build a CT log that was accepted by Google in 2013.

    • General CSR Creation Guidelines
    • Before you can order an SSL certificate, it is recommended that you generate a Certificate Signing Request (CSR) from your server or device. Learn more about SSL certificates » A CSR is an encoded file that provides you with a standardized way to send CA your public key as well as some information that identifies your company and domain name. When you generate a CSR, most server software asks for the following information: common name (e.g., www.example.com), organization name and location (country, state/province, city/town), key type (typically RSA), and key size (2048-bit minimum). If you aren't sure of the exact company name or location when you generate the CSR, don't worry; we can change and finalize that information during our review process before we issue the certificate. Once your CSR is created, you'll need to copy and paste it into the online order form when you go to purchase your SSL certificate.

    • Why do we need to collect identifiable information about businesses and organizations?
    • The application of OV and EV SSL certificate not only needs to verify the ownership of the domain name, but also needs to verify the real identity of the enterprise or organization. Moreover, applying for an enterprise-type OV or EV certificate needs to be reviewed manually, which makes it difficult for criminals to obtain such certificates. Please ensure that the information submitted is valid.

Chat Now

Email Us

Email Address:

sales@bestcert.net

Top