X.509

X.509
Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks
StatusIn force (Recommendation)
First published1.0 at November 25, 1988 (1988-11-25)
Latest version9.1
October 14, 2021 (2021-10-14)
OrganizationITU-T
CommitteeITU-T Study Group 17
SeriesX
Base standardsASN.1
Related standardsISO/IEC 9594-8:2020, X.500
DomainCryptography
Websitewww.itu.int/rec/T-REC-X.509

In cryptography, X.509 is an International Telecommunication Union (ITU) standard defining the format of public key certificates.[1] X.509 certificates are used in many Internet protocols, including TLS/SSL, which is the basis for HTTPS,[2] the secure protocol for browsing the web. They are also used in offline applications, like electronic signatures.[3]

An X.509 certificate binds an identity to a public key using a digital signature. A certificate contains an identity (a hostname, or an organization, or an individual) and a public key (RSA, DSA, ECDSA, ed25519, etc.), and is either signed by a certificate authority or is self-signed. When a certificate is signed by a trusted certificate authority, or validated by other means, someone holding that certificate can use the public key it contains to establish secure communications with another party, or validate documents digitally signed by the corresponding private key.

X.509 also defines certificate revocation lists, which are a means to distribute information about certificates that have been deemed invalid by a signing authority, as well as a certification path validation algorithm, which allows for certificates to be signed by intermediate CA certificates, which are, in turn, signed by other certificates, eventually reaching a trust anchor.

X.509 is defined by the ITU's "Standardization Sector" (ITU-T's SG17), in ITU-T Study Group 17 and is based on Abstract Syntax Notation One (ASN.1), another ITU-T standard.

  1. ^ "X.509: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks". ITU. Retrieved 6 November 2019.
  2. ^ Cite error: The named reference :0 was invoked but never defined (see the help page).
  3. ^ "Monumental Cybersecurity Blunders". circleid.com. Retrieved 2022-09-03.

© MMXXIII Rich X Search. We shall prevail. All rights reserved. Rich X Search