CS Notes

Recent writing

  • VLAN

    Aug 29, 2025

    • networking
  • End-to-End Service Access Troubleshooting

    Aug 29, 2025

    • networking
  • File System Link

    Aug 29, 2025

    • OS
    • bash

See 642 more →

👋🏻 Join My Telegram channel!


I share real-world lessons from building scalable systems at Binance, and running mission-critical cloud ops at GovTech and Singapore Air Force. No fluff, just practical takeaways, hard-earned fixes, and deep dives that matter.

Home

❯

Security

❯

PEM (Privacy Enhanced Mail)

PEM (Privacy Enhanced Mail)

54 words, 1 min read
Last updated on Mar 02, 2024
🌟 Edit This Page!   🗓️ History

  • security
Xinyang YU

Abstract


  • Base 64 Encoding-encoded ASCII files
  • Doesn’t determine the content. The encoded content & header/footer markers define the data’s purpose

Extension

  • .pem
  • .crt
  • .cer
  • .key etc

Common types of cryptographic objects that can be stored in PEM format include

  1. X.509 Certificate
  2. Private Key & Public Key
  3. Certificate Signing Requests (CSRs)
  4. Certificate Revocation Lists (CRLs)

Graph View


Created by Xinyang YU | © 2023, 2025 | Licensed under CC BY-NC 4.0

  • GitHub