FAQs PNPKI 2023 Edition
FAQs PNPKI 2023 Edition
The Public Key Infrastructure (PKI), as its name implies, is an infrastructure that
secures communications among individuals and government agencies. This way, the
government’s delivery of services to citizens and businesses becomes safer, faster,
and more efficient.
No. The public key in PKI refers to the virtual ‘key’ that subscribers use to secure files
sent over an otherwise unsecure ‘public’ network like the Internet. While it is called
public, it can also work in a private network setting.
As more and more people rely on the use of online applications over unsecure network
like the Internet, the need to secure files and ensure their information integrity
increases. This is where the PKI comes in. It addresses the issue of authenticity,
confidentiality, and integrity of information.
1
Where can I use a digital certificate?
You can use a digital certificate in your email and other documents. You can use it to
encrypt a document and/or digitally sign it. Its use is to authenticate documents or put
signatures on them or both.
People need a digital certificate to send you an encrypted email, for instance, that only
you can open. They also use it to verify your digital signature on electronic documents.
It is not the certificate that you need to protect but the private key that is associated
with it. Hence, in cryptographic tokens, the private key is generated in the token and
cannot be extracted from it. Soft tokens however store this private key as an ordinary
electronic file. It is usually encrypted, and the encryption is computationally infeasible
to break. Nonetheless, this private key, if someone gets a copy of it and the
passphrase to use it can be used along with the digital certificate to fraudulently sign
documents or open encrypted email.
Of course, you do. It’s just that you will not be able to do the following: open encrypted
files, access applications that require digital certificates and digitally sign documents
for authenticity.
Whenever you feel like it, or every time secure communication is needed, or a digital
certificate is required for authenticity, confidentiality, and integrity of data.
Any individual who is of age and possesses the necessary documents (as stated in
the application form) may apply for a digital certificate.
2
Where can I use a digital certificate?
A digital certificate is valid up to two years. After that, you have to apply for a new one.
A digital certificate, technically, cannot be ‘renewed.’ It means you have to apply for a
new one every time it expires and go through the application process again. All
requirements will have to be satisfied and personal appearance is required.
It can be stored in a USB secure token, an ordinary USB flash disk, a PC, a laptop or
any mobile computer. The USB secure token is the safest because it has a built-in
application that allows only a limited number of times for entering the PIN before it is
blocked. A token can contain up to ten (10) certificates. Setting the token in the factory
default will erase all data in its memory.
You can avail of the following types of certificates: Authentication certificate – used in
applications that require the user to login. It can be used to encrypt email. Signing
certificate – used to digitally sign documents. SSL certificate – a certificate for
machines, like web servers, application servers, routers, Wi-Fi devices, and others.
(This is not yet available as of this writing.)
The digital certificate is a public document. The moment you use it you can never lose
it. However, if the private key is lost, compromised or the passphrase to use it is
forgotten, then the certificate needs to be revoked and a new key can be generated
as well as the digital certificate that will be associated with it.
3
What if the subscriber resigns, retires or exits from government service?
If it is a soft token, surrendering it is not necessary. The revocation can be easily done
by the CA. However, if it is a cryptographic token and the company or CA owns it, then
it needs to be surrendered. Individual owners may continue to use the certificates for
transactions outside the concerned agency.
You have the responsibility to protect the certificate from misuse and abuse. You
cannot, for example, lend it to other people or use it to forge documents or commit
illegal acts with it. Unauthorized and illegal use are punishable according to the
severity of the offense. A policy will be issued detailing the punishment for each
administrative or criminal offense committed in the use of a digital certificate.
Upon completion of all the requirements by the applicant, a verification process will
start. This process will take a minimum of one day and a maximum of two days,
depending on the completion of requirements. After submission of documents
(complete), the certificate is issued within a day or two. According to the policy (Section
4.2.3 of the RootCA-CP), issuance of the digital certificate should not exceed five
calendar days after successful identity verification.
A person may have two digital certificates: one for authentication and another for
digital signing. He or she may get a third certificate, which is still to be offered, for PKI-
enabled machines.
Firefox is recommended as it works well with Java, which is needed to run the digital
certificates. Google Chrome, on the other hand, usually can’t recognize Java.
4
What is the best email provider to use when encrypting and signing
emails?
It is recommended to use email providers, such as Thunderbird and Outlook, for your
digital certificates.