{"id":11274,"date":"2024-10-29T09:12:00","date_gmt":"2024-10-29T08:12:00","guid":{"rendered":"https:\/\/lemarit.com\/insights\/first-google-now-apple-why-should-the-validity-period-of-ssl-certificates-be-shortened\/"},"modified":"2026-02-12T16:04:39","modified_gmt":"2026-02-12T15:04:39","slug":"first-google-now-apple-why-should-the-validity-period-of-ssl-certificates-be-shortened","status":"publish","type":"post","link":"https:\/\/lemarit.com\/en\/insights\/first-google-now-apple-why-should-the-validity-period-of-ssl-certificates-be-shortened\/","title":{"rendered":"First Google, now Apple: Why should the validity period of SSL certificates be shortened?"},"content":{"rendered":"\n<p>Google wants to shorten the validity period of websites\u2019 digital certificates to 90 days. Apple has now followed suit, proposing a gradual reduction to 45 days in the future. This change affects all companies that secure their communications with digital certificates. But what is driving this push\u2014and how can companies respond to the shortened validity?   <\/p>\n\n<h3 class=\"wp-block-heading\">Background<\/h3>\n\n<p>The validity period of digital certificates has been continuously reduced for years. Until 2015, certificates were still issued with validity periods of up to five years; the maximum validity was then initially limited to three years and finally to two years in 2018. Since autumn 2020, SSL\/TLS certificates have been issued with a validity period of 398 days, i.e., around 13 months. The underlying idea: shorter validity periods are intended to increase their reliability and to take account of growing computing power\u2014and the associated increased risk of encryption being broken.   <\/p>\n\n<p class=\"has-white-color has-primary-1-background-color has-text-color has-background has-link-color wp-elements-9abc6d69fa40226017a9b8a353da5587\">SSL certificates and S\/MIME certificates are used to establish secure TLS connections with a network endpoint, to uniquely identify the sender of an email, or to send the content of an email in encrypted form. They can also be used to verify the authenticity of an endpoint, for example to detect man-in-the-middle attacks. The validity of an SSL certificate that is presented depends, among other things, on whether it was issued by a generally recognized certificate authority or by an intermediate authority signed by it. Top-level certificate authorities are also known as Root CAs and serve as trust anchors when validating SSL certificates.   <\/p>\n\n<p>In early 2023, Google\u2014acting as the primary developer of the Chromium3 web browser engine and the Chromium OS operating system\u2014published a proposal for the future development of the public SSL certificate infrastructure. The significance of this proposal is underscored by the fact that Google is also the administrator of the Chrome Root Store. For almost 70% of all smartphones and 66% of web browser users, it determines which certificate authorities are recognized as trustworthy and valid. This market share inevitably means that Google could turn the Chromium project\u2019s requirements into a de facto standard.   <\/p>\n\n<p>The proposed changes to the Chrome Root Store policies were <a href=\"https:\/\/www.chromium.org\/Home\/chromium-security\/root-ca-policy\/moving-forward-together\/\" target=\"_blank\" rel=\"noreferrer noopener\">published<\/a> under the title \u201cMoving Forward, Together\u201d. A number of fundamental objectives are cited as reasons for the adjustments: <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Promoting modern and agile infrastructures<\/li>\n\n\n\n<li>Establishing simple concepts<\/li>\n\n\n\n<li>Comprehensive automation<\/li>\n\n\n\n<li>Fewer incorrectly issued certificates<\/li>\n\n\n\n<li>Overall strengthening of the integrity of the ecosystem<\/li>\n\n\n\n<li>Standardized and optimized domain validation procedures<\/li>\n\n\n\n<li>Preparing for a \u201cpost-quantum\u201d world<\/li>\n<\/ul>\n\n<p>After Google moved away from its originally communicated goal of enforcing the shortened validity period as early as 2024, Apple made a parallel move in October 2024\u2014aiming to reduce certificate lifetimes as well. In a draft ballot proposal published on GitHub, known as Ballot SC-081, Apple presents the timeline for reducing certificate validity periods. Starting on September 15, 2025, the validity period is to be reduced step by step from the current 398 days to 45 days in the future.  <\/p>\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Date<\/th><th>Maximum validity period<\/th><\/tr><\/thead><tbody><tr><td>September 15, 2025<\/td><td>200 days<\/td><\/tr><tr><td>September 15, 2026<\/td><td>100 days<\/td><\/tr><tr><td>April 15, 2027<\/td><td>45 days<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<h3 class=\"wp-block-heading\">The issue of quantum computers<\/h3>\n\n<p>So why are two global players pushing so strongly for shorter SSL certificate validity periods? The answer is multifaceted, but it is worth looking into the crystal ball\u2014toward a \u201cpost-quantum\u201d world. For the IT landscape in general, the development of quantum computers holds great potential, as they could overcome some computing-time-related hurdles for well-known problems in mathematics and physics. At the same time, however, this also poses certain risks for cryptography, for example, because the algorithms used there are mostly based on the assumption that the associated mathematical problem is extremely difficult for an external attacker to solve.   <\/p>\n\n<p>In the future, quantum computers could be able to solve problems such as prime factorization or the discrete logarithm problem\u2014on which many cryptographic algorithms are based\u2014much faster than classical computers. In particular, Shor\u2019s algorithm, which runs exclusively on quantum computers, could, as the capacity of these machines increases, jeopardize modern asymmetric encryption methods such as RSA and Elliptic Curve Cryptography (ECC). <\/p>\n\n<p>While classical computers require many sequential computation steps, quantum computers could solve these tasks far more efficiently thanks to their ability to process many states simultaneously. This would enable attackers to break commonly used encryption methods and decrypt sensitive data. <\/p>\n\n<h3 class=\"wp-block-heading\">What improvements are Google and Apple hoping for?<\/h3>\n\n<p>Implementing the policy adjustments originally proposed by Google\u2019s Chromium project would significantly increase the agility of the ecosystem surrounding public SSL certificates. This is due in particular to comprehensive automation of ordering and renewal processes, as well as reliable update strategies for root certificate lists in operating systems and applications. As a result, certificate rotation would increasingly become routine instead of a critical, long-term planned change\u2014regardless of whether it concerns a root certificate, a CA intermediate certificate, or a simple TLS endpoint certificate.  <\/p>\n\n<p>Another reason to push these adjustments forward is the aforementioned ongoing development of quantum computers. While these do not yet pose a significant threat to common key lengths, an increasing number of qubits and falling error rates could make it possible to crack algorithms such as RSA and ECDSA with 2048 and 256 bits, respectively, using Shor\u2019s algorithm. <\/p>\n\n<h3 class=\"wp-block-heading\">Automated certificate management is becoming a stronger focus<\/h3>\n\n<p>For operators of IT systems, the most obvious impact is how they will manage digital certificates with shorter validity periods. Google itself notes this in its rationale for reducing the validity period: companies that provide a TLS endpoint cannot avoid automating digital certificate lifecycles on a large scale. <\/p>\n\n<p>If the validity period is shortened to 90 days, companies would have to have the relevant certificates reissued and installed four times as often per year. Even if annual certificate costs remain the same\u2014by adjusting the cost of a single certificate, subscription models, or other adaptations\u2014the resulting management and administrative effort quadruples, along with the associated staffing costs. It goes without saying what Apple\u2019s proposal to halve the lifetime again to 45 days would mean.  <\/p>\n\n<p>Alongside technical provisioning, fully automated renewal therefore also increases the need for a well-coordinated management process. Previously, each manual renewal at least implicitly confirmed that the certificate was still needed. In an automated process, potentially obsolete systems may only become noticeable in the aggregate through a high final bill.  <\/p>\n\n<p>CAs such as DigiCert and Sectigo are addressing this challenge with web-based portals that provide better oversight and are intended to simplify certificate management itself. However, a core aspect of these solutions is merely the delegation of responsibilities. Whether a certificate is still needed and what role it plays in the context of the company\u2019s digital presence must still be known by the responsible internal entity or verified manually.  <\/p>\n\n<p>LEMARIT is actively working on integrating these management solutions into the world of LEMARIT.app in order to present the relevance and use of a certificate clearly in a domain context. Automated certificate management includes, among other things, seamless linking between DNS records and the corresponding certificates in the form of direct links, validity checks when DNS changes occur, and notices about certificates that are no longer in use. <\/p>\n\n<div class=\"wp-block-nk-awb nk-awb\" style=\"padding-top:33px;padding-right:43px;padding-bottom:43px;padding-left:43px\"><div class=\"nk-awb-wrap\" data-awb-type=\"color\"><div class=\"nk-awb-overlay\" style=\"background: #87c8e0;\"><\/div><\/div><div class=\"nk-awb-wrap-content is-layout-constrained wp-container-nk-awb-is-layout-9aef4727 wp-block-nk-awb-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center has-white-color has-text-color has-link-color wp-elements-0956bd47ba06d0247b05d178a28a1afb\">Ready for the shortened validity period?<\/h3>\n\n\n\n<p class=\"has-text-align-center has-white-color has-text-color has-link-color wp-elements-2b8cabaef67da8554a1e5afd1970392c\">Regardless of the requirements or use cases that define your online presence: from the SSL\/TLS entry-level version to implementing the highest certificate standards, LEMARIT offers the full range of solutions\u2014and prepares your company for the announced reduction in validity periods.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-primary-2-background-color has-background has-custom-font-size wp-element-button\" style=\"font-size:16px\">Contact us now<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google wants to shorten the validity period of websites\u2019 digital certificates to 90 days. Apple has now followed suit, proposing a gradual reduction to 45 days in the future. This change affects all companies that secure their communications with digital certificates. But what is driving this push\u2014and how can companies respond to the shortened validity? [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":11275,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[63],"tags":[],"class_list":["post-11274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-corporate-news","grve-entry-item","grve-blog-item"],"_links":{"self":[{"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/posts\/11274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/comments?post=11274"}],"version-history":[{"count":2,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/posts\/11274\/revisions"}],"predecessor-version":[{"id":11277,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/posts\/11274\/revisions\/11277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/media\/11275"}],"wp:attachment":[{"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/media?parent=11274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/categories?post=11274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/tags?post=11274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}