Simplified view on How Certificate Signing works



Steps for signing certificate by CA

  1. The Subscriber (the person asking a CA to issue them a certificate) sends a Certificate Signing Request (CSR) to the CA which contains all of their details like name, domain name etc.
  2. The CA will then take a blank certificate and begins to fill in the details of the Subscriber, validating ownership of the domain along the way, until they have completed all of the fields in the certificate.
  3. At this stage we have what we call the Pre-Certificate, it’s basically a finished certificate ready to issue but the only thing that’s missing is the CAs signature on the bottom of the certificate to make it official

Signing of certificate

  1. CA takes Pre-Certificate and running it through a hash function, currently SHA256, to obtain the digest.
  2. The second step is the CA then taking that digest and encrypting it with their private key.
  3. This encrypted digest is the signature and once appended to the end of the file we now have a signed certificate that can be issued to the Subscriber.

Rules public key encryption

  1. For every private key, there is only one corresponding public key.
  2. Also Data encrypted with the public key can only be decrypted with it’s corresponding private key, and data encrypted with the private key can only be decrypted with it’s corresponding public key.
  3. More rules and info at:

Q: How does adding the encrypted digest i.e. signature makes it signed certificate ?

A: It can better be explained by putting browser in picture and looking at what it does while requesting https website.

What browser does

  1. During tls handshake with https endpoint, it fetches associate intermediate certificate and root certificate.
    • We need to upload intermediate certificate(public key of CA) and root certificate while uploading ssl certificate.
  2. Browser now decrypts the digest using intermediate certificates, if it is able to decrypt using intermediate key, it means that above certificate is signed by private-key of CA(data encrypted with the private key can only be decrypted with it’s corresponding public key)
  3. Browser itself also calculate hash of pre-certificate to compare with hash it got in step 2 after decrypting digest.
  4. If both are correct means,
    • The signature definitely came from the CA. (Authenticity) - Step 2
    • The certificate has not been tampered with. (Integrity) - Step 3

Above is over-simplified explanation of what happens, above all is taken from 1st half of post at :

If you want to read further, continue reading at :

For feedback reach me at