Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Digital Signature

Posted on 2016-08-22
2
Medium Priority
?
20 Views
Last Modified: 2016-09-10
What is the difference between a PKCS#12 digital ID file and a Windows Certificate Store?  How are these used and how portable are they ?  Which is more secure?
0
Comment
Question by:Michael Miller
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points (awarded by participants)
ID: 41766170
PKCS12 ID is actually just a file that contains the keypair that is tied to the specific identity or entity. It can be refer to PFX or P12  extension files.

Cert Store is just a storage place widely refers to Windows repository storing the digital x509v3 certificates for the issued key pair.

The digital ID could reside in the Mac Keychain (its the Macintosh equivalent of the Windows Certificate Store), or on a smart card or USB token or even a specialized server, all of which application such as Acrobat can access.

The crux of the matter is the .PFX file is itself being encrypted using password security. Cert Store can be accessible by authorised user and the OS. The use of PFX does assure the owner of the key issued as compared the assurance comes from an trusted certificate authority (in trusted root store). Anyway, you likely to have both for secure identity and going for your digital signing amd encryption.
0
 
LVL 65

Expert Comment

by:btan
ID: 41792490
Explanation given.
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I don't pretend to be an expert at this, but I have found a few things that are useful. I hope that sharing them here will help others, so they will not have to face some rather hard choices. Since I felt this to be a topic of enough importance and…
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question