
352 Smart Phone and Next-Generation Mobile Computing
Table 6.2 Field in a Digital Certificate
Field Description
Version Version number
Serial number Unique ID of the certificate
Certificate signature algorithm Encryption and hashing algorithms used to create the
signature in the certificate
Issuer ID of the issuing CA
Validity Duration for which the certificate is valid
Subject Owner information
Subject public key info Subject’s public key algorithm (RSA, for example) and
public key
Extensions Additional information regarding the certificate
Certificate Signature Value Signature of the CA
A third PKI architecture, mesh PKI, is shown in Figure 6.3c. There
is no