This app lets you view files signed by P7S Signer or other digital signature software.
- certificate checking
- date/time checking
- timestamping verification
Certificates provide the foundation of a public key infrastructure (PKI). These are electronic credentials, issued by a certification authority (CA), that are associated with a public and private key pair.
In an X.509 version 3 digital certificate, the following important certificate extensions can exist:
Key Usage. A CA, user, computer, network device, or service can have more than one certificate. The Key Usage extension defines the security services for which a certificate can be used. The options can be used in any combination and can include the following:
- Digital Signature. The public key can be used to verify signatures. This key is also used for client authentication and data-origin validation.
- Non-Repudiation. The public key can be used to validate the signer’s identity, preventing a signer from denying that he/she signed a package.
- Data Encipherment. The public key can be used to directly encrypt data, rather than exchanging a symmetric key for data encryption.
Enhanced Key Usage. This extension indicates how a certificate’s public key can be used. The Enhanced Key Usage extension provides additional information beyond the general purposes defined in the Key Usage extension. For example, OIDs exist for Client Authentication (188.8.131.52.184.108.40.206.2), Server Authentication (220.127.116.11.18.104.22.168.1), and Secure E-mail (22.214.171.124.126.96.36.199.4). When a certificate is presented to an application, an application can require the presence of an Enhanced Key Usage OID specific to that application.
An easy to use replacement of OpenSSL.
This is full-featured version without any limitations. You can try "YOCA PKI Trial" version before buy.
With YOCA you can:
• generate strong public/private keys
• create self-signed CA certificates
• issue client certificates for web browser client authentication, HTTPS server authentication (eg. Apache), VPN user and server authentication (eg. OpenVPN), etc.
• issue and/or sign certificate signing requests (CSR)
• verify certificates with CA certificate
• create and verify file signatures
• import and export encrypted PKCS#12 (.p12) keystores
• import and export encrypted keys, certificates and CSR's
YOCA PKI contains support for:
• assigning basic and extended key usage in certifcate extensions
• one-click archiving and restoring of all keys and certificates, archives are encrypted with AES symmetric cipher
• RSA and DSA key types
• SHA-1 and SHA-256 signature (digest) types
This application contains set of tools for asymmetric cryptography. Asymmetric cryptography uses two mathematically linked keys. Only way to decrypt data encrypted with one of them is to use the other one. One of them is declared public and is usually used for data encryption and verifying signatures. The other is declared private, protected with passphrase and is used for decryption and creating data signatures.