Skip to main content
banner image
venafi logo
Education Center Detail

Education Center -
Code Signing

Code Signing Certificates [Your In-Depth Guide]

It is important that your customers trust your software that they download from the internet and install. They need to know that it comes from you and not some third-party masquerading as you. And they need to know that it has not been altered during its lifetime by a third party, such as having malware inserted. Code signing helps your customers know that your company is the official publisher of the code and that no other third party has modified it since you signed it.

Browse a specific section by clicking on any of the quick links below:
  1. What is Code Signing?
  2. How Does Code Signing Work?
  3. What Does Code Signing Do?
  4. Where is Code Signing Used?
  5. How To Add Certificates To Trusted Sites
  6. What Are the Strengths of Code Signing?
  7. What Are the Weaknesses of Code Signing?
  8. Keep Your Information Secure with Venafi
1. What is Code Signing?

Code signing is simply a guarantee that the code of a program or software download has not been corrupted and tampered after it was signed by the publisher. This is a short explanation, so let’s delve a little bit deeper to learn more about how code signing works and why it’s important.

Just as you want to be certain when you log into your bank account that you’ve given your password to the intended bank and not a man-in-the-middle attacker, it’s best to be sure that the programs and updates you download are safe are from the authentic publishers. To do that, we use the same public key infrastructure (PKI) used in HTTPS. When it’s used to sign and verify a software program, though, it’s called code signing.

Benefits of Code Signing

Code signing is a method of putting a digital signature on a program, file, software update, or executable, so that its authenticity and integrity can be verified upon installation and execution. Like the wax seal of old, it guarantees to the recipient who the author is, and that it hasn’t been opened and tampered with. Microsoft developers, programmers, and software engineers use code signing to prove, for instance, that your Windows 10 update actually came from Microsoft, and not a hacker who is trying to compromise your computer.

Code Signing Example

If you’ve ever seen that little popup that comes up when you try to run a program you’ve downloaded, the one that lists who the publisher is and asks “Are you sure you want to run this?” then you have seen code signing in action. That dialogue box is telling you that it really is a software patch for your Mac OSX from Apple Inc., and that it’s still in the same condition it was when they signed it.

Code signing is what allows you to be sure you are downloading a file from the right author/publisher instead of an attacker who wants to take your information and data. Essentially, code signing lets you know that the code hasn’t been changed by a bad guy so you know it’s safe to install and run on your machine.

2. How Does Code Signing Work?

From a developer’s point of view, there are 3 major components involved in the process of code signing: 1) code signing certificates 2) code signing applications 3) unsigned software files. The code signing applications usually come with the operating systems such as Microsoft Windows, Mac OSX, etc. The code signing certificates are often from CAs (certificate authorities). Let’s dial into how code signing works and take a look at the key concepts that are involved in this process.

Public Key Encryption

Encryption is any time encode a message to protect it from unwanted viewers. Usually this is done by passing it through a mathematical function (called a “key”) to change values, and decoding the message depends on having the key that returns the values back to their original state, allowing the message to be read. In public key encryption (or asymmetric encryption), the key that encodes the message and the one that decodes it are different (hence asymmetrical). It’s called public key, because one key is made widely available (the “public key”) while the other is kept private (the “private key”) to ensure the security of the message. This kind of encryption relies on private keys being kept safe and secret and away from those who would intercept or adulterate messages. Whether the public key is used to encode or decode the message depends on the nature of the transmission. If you want everyone reading it, but you don’t want anyone tampering with the message, you encode with the private key and decode with the public key. If you want everyone to be able to send a message, but don’t want them intercepted by the wrong person, you encode with the public key, but decode with the private key.

Hash Function

Hash functions are a method of cryptography that is designed to be irreversible. Rather than encoding with a key and using a key to decode, hash functions are meant to be one-way, using a mathematical function which changes the values in a way that can’t be undone. The most common analogy is that of mixing paint. For example, you can mix blue (the original values) with yellow (the hash function) to get green (the new values), and you’ll get green every time you mix them, but there’s no way to separate the two colors and recover the blue. Hash functions are used whenever you need a set value, and don’t need to read the information a second time. Login passwords are the most common example: websites often hash them for storage, so that if there’s ever a breach, all the hacker has stolen is a bunch of gibberish values. Meanwhile, when you log into the website, it hashes your password again and compares it to the stored hash value. If what you entered matches what they have on file, they let you in. They don’t need to read the password, they just need the value.

Code Signing Certificates

Now back to code signing. Before the developer can sign their work, they need to generate a public/private key pair. This is often done locally through software tools such as `openssl`. S/he then gives the public key and the organization’s identity information to a trustworthy CA of choice. The CA verifies the authenticity of identity information and then issues the certificate to the developer. This is the code signing certificate which was signed by CA’s private key and contains the developer organization’s identity and the developer’s public key.

When a developer is ready to “sign” their work to prove its authorship and such, they take all the code they wrote, and they hash it. The value that spits out is then encoded using the abovementioned private key (usually generated by the author), along with the abovementioned code signing certificate that contains the public key and the identity of the author (proving the authorship). It’s then added to the software to be shipped out.

This constitutes a code signing operation. The public key of the CA is already pre-installed in most browsers and the operating system’s trust stores. When a user downloads the software, they use the CA’s public key to first verify the authenticity of the code signing certificate embedded in the signed software and confirms that it's from a trustworthy CA. It then extracts the developer’s public key from the certificate and use it to decrypt the encrypted hash. Then, the software is hashed again, and the new value is compared to the decrypted one. If the user’s hash value and the developer’s hash value match, then the software hasn’t been corrupted or tampered with during transmission. The user is then alerted that the software is as the developer last left it, and (if the developer is to be trusted) it’s safe to install and run.

Root Certificates

As an end user, although code signing can provide assurance to you the authenticity and integrity of the downloaded software, you should also be aware that anyone can create a public private key pair and generate a code signing certificate from them and make it appear as though they were endorsed by a valid CA. If anyone can create a code signing certificate, how do you know which certificates are trustworthy? Great question. This is where root certificates come in. You can think of code signing certificates sort of like a family tree. In order to verify where they have come from, you can trace them back to see what signing certificate is at the root of the tree—your root certificate. The root certificate determines if the other code signing certificates are trustworthy because you can trace the “chain of trust” back to the original signing authority. This root authority could be a company like Microsoft or Apple. If your software’s signing certificate cannot find a trustworthy root certificate, then the system will advise you not to trust the code signing certificate which signs the software you are attempting to download. Sometimes even a trusted authority may not be recognized because it has not been installed on a browser or in an operating system’s trust store. In these instances, you will need to manually install the root certificate on your trust store so the browser or the operating system recognize the root certificate as trustworthy and valid.

3. What Does Code Signing Do?

As a user, code signing has a couple of different functions that can help you know if you can trust software downloads and other interactions on the internet. The main purpose of code signing is to authenticate the author of the software, download, or file. For example, a download file sent from Microsoft appears much more trustworthy than a file from Joe Schmoe and you are more likely to install it on their computers.

Code signing also allows you to see if there is a valid security certificate. Think of the certificate as sort of like having a wax seal on your download. If the seal is broken, you know the material has been tampered with or compromised. If it is intact, you know the message inside is from the original sender, and the integrity of the original content has not been altered.

When you install software onto your computer, you are sure to have at least some updates in the future. When these updates are code signed with the same key used to "seal" your initial downloads, you can trust that future updates are coming from the same source and are therefore safe to execute on your machine as well.

What Are the Types of Digital Certificates?

Different systems require different types of authentication. What works on a desktop is likely unsuitable for mobile systems and vice versa. Here are a few examples of the different certificates for both desktop and mobile software. Desktop Certificates:

  • Microsoft
  • Java
  • Microsoft Office and VBA
  • Adobe AI

Mobile Certificates:

  • Windows Phone
  • Windows Phone Private Enterprise
  • Java Verified
  • Android
  • Brew

If you’re looking to sign and secure your software, you should first know what kind of software or system you are starting with and work from there.

What is the Use of a Digital Certificate?

The obvious answer when it comes to wondering what the use of a digital certificate is, is that it is meant to give an identity to the software or code you’re publishing to your users. With a digital certificate, users can authenticate the software publisher. These digital certificates also inspire users’ trust in publishers because they are issued by certificate authorities. Digital certificates are also extremely useful for software publishers because they allow the publishers to track their software and track how many copies are downloaded.

How Long is a Digital Certificate Valid?

Another common question for those looking to get their own digital code signing certificate is how long a certificate is valid. Although the exact time frame varies depending on the issuer, digital certificates are typically only valid for a year or two. This is for a couple of reasons:

  • Revenue: A short time frame for renewal means guaranteed revenue for the certificate authority.
  • Increased Security: Security certificates and private keys can and do get compromised. Renewing and changing certificates every year or two renders any previous certificates invalid—even stolen ones.
  • Changing Technology: The world changes fast, and technology changes even faster. What was secure 5 years ago isn’t nearly as secure today. Changing code signing certificates and updating them helps ensure the certificate security is up to date.
4. Where is Code Signing Used?

Code signing is used any place a developer wants a user to be sure of the source of a piece of software. This includes:

1. Windows applications and software patches

2. Apple software

3. Microsoft Office VBA objects and macros

4. .jar files

5. .air or .airi files

6. Essentially any executable

Be aware that, because of the distributed nature of Linux development, code signing is often not used for Linux-based software, meaning that software will come unsigned, and your computer will (if it gives any notice) will tell you it’s from an “unknown developer,” or something along those lines. Here are a few other applications and software that utilize code signing to increase their security.

  • Code Signing in iOS: Code signing in iOS for the App Store is done using Xcode. The purpose of singing your app is simply to let iOS know who signed the app originally and to make sure it hasn’t been altered since it was originally signed by the developer. If you need to revoke your iOS certificate, you will need to use your developer account or Xcode to complete the process.
  • Code Signing in Xcode: Xcode is used by iOS to code sign apps and ensure their security. Before any device can be uploaded and approved for the iTunes store it must have a valid Apple Developer ID, with a valid certificate or profile. To successfully integrate your app, you will need to use a development certificate. In order to run the app on any device, you must use a distribution certificate to send out the app and test it.
  • Code Signing C#: Visual C# uses strong name signing to get a unique sign code that is not available to anyone else in the world and cannot be spoofed. When using Visual C#, you can simply sign your deployment using the sn.exe tool. This functions as your signature by using sigcheck tool printing “Strong Name: Signed.”
  • Windows Code Signing Certificate: Nearly any executable can be signed with a digital signature to verify the security and integrity of the file. For the file to be considered secure in Windows, it must be signed by a recognized certificate authority. Anyone who distributes malware under a valid certificate is held legally accountable for the software they distribute.
  • Visual Studio Code Signing: Visual Studio is particularly helpful when it comes to strong name signing for assemblies—a notoriously difficult task. Strong name signing through Visual Studio allows other computers to trust the software developer.

Essentially, any executable file or software can use code signing to verify authenticity and provide additional security for users.

5. What Are the Strengths of Code Signing?

Code signing does a couple of very important things. It ensures the identity of the developer (the authorship), meaning a random attacker can’t pass off some malware as being a software patch from Microsoft or Apple. It allows double-checks the software to ensure that it hasn’t degraded, become corrupted, or been tampered with upon installation. Comparing the user-generated hash against the developer-generated value ensures that the code looks the same now as it did when it was signed by the developer.

If a developer is using a code signing certificate it acquired from a certificate authority (CA), then code signing also extends the trust of the CA to the developer, meaning a relatively unknown software company can still be reasonably trusted by the public.

6. What Are the Weaknesses of Code Signing?

The biggest downsides to code signing come when the system isn’t used properly. First, certificates are only good if the private key (the one used to encode the certificate) are kept safe and secret. If unscrupulous individuals gain access to the private key, they can potentially encode their own messages and software as if they were the developer, and the public key will verify the identity, with leaves the user with no way of guaranteeing it was really from the intended developer. To this end, it is recommended that these keys to be stored in Hardware Security Modules (HSM) appliances. .

Second, any hacker or developer with malicious intent can obtain a code signing certificate from a CA, if they really want to. What deters most of them is that they have to provide their identity information to the CA to obtain one, which makes the crime easier to attribute to them if they distribute malicious code. Potentially, though, a developer with a valid certificate could distribute harmful code to the public.

Third, when companies have hundreds or thousands of developers and just as many code applications that require signing, it becomes difficult to have visibility into all code signing activities. Code signing private keys are often left unprotected, stored on developer or build server computers. In addition, companies without a defined code signing process and an automated means to enforce code signing processes do not have the ability to secure their code signing process which leaves them vulnerable to private key theft.

Lastly, code signing is really only as good as a user’s judgment. If a user is willing to accept and install software of unverified integrity or identity, code signing is useless. Like the warning label on a bottle of bleach, it’s only effective if the user heeds the cautions listed there.

Keep Your Information Secure with Venafi

Hopefully, you now understand how code signing works as well as the answer to the questions, “what is code signing?” and “what is a code signing certificate?” With this information tucked securely under your belt, you can see why code signing certificates are not only useful for software developers, but also for anyone who sends secure information online. All-in-all, though, when a company enforces enforces their code signing process by requiring keys to be securely & centrally stored, code signing processes defined and automatically enforced, they can significantly mitigate the risks that cybercriminals obtain and use their code signing credentials.

For more information on how Venafi can help secure your code signing process, and how to keep your systems safe from hackers, check out our Venafi Next-Gen Code Signing solution or watch our code signing webinar.

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more