Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

PDF Password or Certificate Encryption?

in Blog, Document Security, DRM, PDF Security

Certificates or Passwords for PDF encryption – which is best?

Should you use passwords or certificates to protect confidential and sensitive business documents from leakage and misuse, or is there a better way?

When you encrypt a PDF file, you have the choice of using either password encryption or certificate encryption. Here, we cover everything you need to know about these options, including:

  1. Choosing the right PDF protection for your business
  2. How does PDF encryption work?
  3. PDF encryption using passwords
  4. PDF certificate encryption
  5. What about PDF restrictions to stop editing, copying, printing?
  6. Protecting PDF files without passwords or certificates
  7. Are passwords, certificates, or neither best for PDF encryption?

  Choosing the right PDF protection for your business

Whether you choose one protection method over the other depends on the reasons why you need to protect PDF files to begin with.  The content may be commercially sensitive or confidential – such as trade secrets or intellectual property, or it may be personal data that must comply with regulations such as HIPAA or GDPR.

You may have a requirement to share documents within your organization securely or to want to enable secure external document sharing with third parties.  Or it maybe that you have revenue generating content such as ebooks, training courses or reports that you sell, and want to make sure they are not readily copied and pirated.

Whatever the reason, it makes sense to ensure that the method you use to encrypt PDF files cannot be readily bypassed or removed – otherwise, there is not much point applying it to begin with.

  How does PDF Encryption work?


When you encrypt a PDF with either a password or certificate, this is used to protect the random key that is generated that is actually used to encrypt the PDF.  So, for example, if you choose AES 256-bit encryption then a 32-character random key is used to encrypt the PDF and the password or certificate is then used to protect that key from being made readily available.

Once the PDF is encrypted (the document contents are scrambled by the encryption algorithm) then only entry of the correct password (the one used to encrypt the PDF file) or the correct private key (in the case of certificate encryption) will decrypt the contents and enable access.

  PDF Encryption using Passwords

The ability to encrypt a PDF with a password is included with all PDF editing software.  It is part of the PDF standard and is readily available to implement in PDF applications.  Many online PDF protection sites also enable you to encrypt PDF files with a password for free.  That is why it is so popular.

Encrypting a PDF with a password using Adobe Acrobat

  Is PDF password encryption secure?

To answer that question, you need to bear the following in mind:

  1. Anyone you give the password to can decrypt the PDF and remove all protection.
    You have to give users the password if you want them to open the PDF document so you have to trust that they will not give it or the unprotected PDF file to others.
  2. Users can share the PDF and the password with others.
    You cannot prevent users sharing PDF files and passwords with others because there is no security that locks keys to machines or devices.
  3. You have no idea how many times your ‘protected’ PDF file has been shared with others.
    The password is unique to the PDF file and not to the user, so you cannot track who is using it.
  4. A password protected PDF can be broken with password crackers.
    Even if a user does not know the password to the PDF file, they can use a freely available password recovery program or cracker to carry out a ‘brute force’ attack on the password.  The simpler the password (shorter and less complex) the easier and quicker it is to crack.
  5. You have to manage a list of PDF documents and their passwords.
    Password management is a pain in the butt.  For obvious reasons it is not a good idea to use the same password for every PDF file, so you need to keep a list of documents and their corresponding passwords and make sure that is securely stored.  This is also true for users that receive password protected PDF files.
  6. You need to make passwords strong, yet easy for users to remember.
    This is in itself a usability challenge – how many people can accurately type in a 16-character password or more consisting of upper and lower, numbers and special characters?
  7. You have to find a way to securely distribute the passwords to others.
    Passwords need to be sent separately from the protected PDF documents and using a secure form of distribution.  This maybe using a file or email encryption program to securely send them to others.
  8. You need to avoid backwards compatibility with weak implementations.
    For example, if you are using Adobe Acrobat to encrypt PDF files then you should choose the compatibility option “Acrobat X or later”.  This is because in Acrobat 9, Adobe made it much easier to crack passwords with brute-force attacks, making just one call to verify the password for AES 256-bit encryption instead of the 71 calls used in Adobe 8 using AES 128 bit.

So password protection might be a readily available way to encrypt PDF files, and there is no complex registration process that you need to support such as with certificates, but in reality it is pretty useless.

If you still want to use a password to encrypt a PDF, then follow the guidelines for choosing a strong password to protect PDF files so you can create one that can’t be brute-forced easily..

  PDF Certificate Encryption

An alternative to PDF password encryption is to use certificate-based encryption. This is generally a bit more secure than passwords.

   What is PDF certificate encryption?

Certificates are part of PKI (Public Key Infrastructure).  PKI is a system used to identify the creator of the encrypted file and the public identity of the recipient without allowing that information to be used to break into the system readily.

A certificate holds a user’s public key and information about when it was generated, when it expires, and what it can be used for.  Certificates can be signed by a Certificate Authority (CA) who validate the user, or they can be self-signed and it is up to you to trust that the certificate belongs to the right person.  Most organizations generate their own certificates unless they want to use them for secure communications with third parties.

When you use an application to generate a key pair, you will get a certificate containing your public key (this is given to others to encrypt information for you), and a private key that you do not disclose.  The private key is used to decrypt information and digitally sign files.

Cerficate Import: Encrypting a PDF with a certificate using Adobe Acrobat

When using certificate encryption, the PDF file is still protected using a password (for example if AES 256-bit encryption is used then a random 32-character password is used to protect the PDF document), but that password is encrypted using the recipient’s public key.  Only the corresponding private key can decrypt it.

So, certificates are just a secure key exchange mechanism – there are no passwords to distribute or for users to share with others.

  Digitally Signing PDF files

Another advantage of certificate encryption is that users can use digitally sign a PDF.  There are two reasons for doing this:

  1. to assure recipients that the document came from you.
  2. to verify that it has not been tampered with.
    However, due to a weakness in signature validation implementations, PDF documents can be altered and PDF Readers don’t realise that it has been tampered with.

Users use their private key to digitally sign PDF files, and recipients verify the signature using that users’ public key.

  PDF encryption with certificates vs passwords

The use of certificates is more secure for distributing PDF files than passwords since:

  1. you don’t have to worry about how to transmit the password securely to other users.
  2. users are unlikely to share their private key with others and so only the authorized recipient can decrypt it.
  3. there are currently no password cracking applications that can crack PDF files that have been encrypted with certificates.
  4. certificate encryption systems are highly resistant to attack by anyone who does not have an appropriate key to decrypt the file.
  5. PDF files can be digitally signed so you know who they originated from.  This may be important for example if users are downloading documents from a cloud server.

However, just as with password encryption, once a user has decrypted the PDF file, they can do what they want with it, including saving it to an unprotected file.

They also have other disadvantages:

  1. If you are protecting PDF files for internal use, users must have key pairs already generated, and ideally certificates should be stored in a directory server so they are easily accessible for use.
  2. You need to put into place a system for revoking certificates and generating new ones when they expire.  So there is a management overhead to consider.
  3. If you are selling revenue generating content then certificate encryption is unlikely to be a good solution for your business.  This is because you need the user’s certificate before you can encrypt PDF files for them.

  What about PDF restrictions to stop editing, copying, printing?


Whether you encrypt a PDF with a password or a certificate, you can apply PDF restrictions (to stop users editing, copying and printing content) and enter an additional password (a permissions password) to prevent users removing those restrictions – well in theory anyway.

There is only one thing you need to know about applying PDF restrictions – they are completely useless:

  1. Once a user can open the PDF, they can easily remove the restrictions by using freely available password cracking or recovery tools.
  2. PDF restrictions are not enforced by all PDF Readers.
    Some PDF Viewers and other applications completely ignore them, so users can just use Mac Preview, Google Docs, or the appropriate PDF Reader to view ‘protected’ PDF documents and no restrictions will be applied.

Even worse, users could end up compromising your PDF documents by uploading them to cloud servers in order to remove the restrictions.  You have no idea then who has your documents.  So you have added ‘protection’ that has actually made it more likely that your PDF files will be compromised.

So, unless you don’t have anything better to do, don’t bother adding PDF restrictions.  If you want to read more about how the Adobe Acrobat Security Handler works and why PDF restrictions are totally useless, see PDF Security Issues.

  Protecting PDF files without passwords or certificates

So if PDF passwords and certificates don’t provide much protection, what can you do to protect PDF files from being opened by unauthorized users and misused by authorized ones?

A different approach to protecting PDF files is using a PDF DRM system that uses encryption and licensing controls.  Locklizard for example use this approach to securely transfer document decryption keys to authorized user’s devices and then store them in an encrypted keystore that is locked to the device.  This removes the need for both passwords and certificates – PDF files are transparently decrypted if the user has the correct key made available to them.
locking pdfs

Encrypting a PDF without passwords or certificates using Locklizard Safeguard PDF DRM

PDF DRM systems also have the advantage over PDF restrictions in that controls cannot be easily removed as they are persistently enforced by the application.  Some systems use plugins to Adobe to achieve this, some use browser-based systems where users must login to view protected PDF files, and others use dedicated secure PDF Readers.  A dedicated PDF reader is a more secure approach since it has control over the environment – plugins only work within the application so you cannot prevent screen grabbing and other functionality that may be used to bypass the PDF protection, and users can easily share login credentials with others in browser-based systems and manipulate and bypass the JavaScript protection.

Commonly PDF DRM systems will enable you to:

  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Lock PDF files to devices and locations
  • Restrict PDF use – copying, editing, saving to unprotected formats
  • Add dynamic watermarks that cannot be removed
  • Track PDF opens and prints

One of the most important features of a PDF DRM system is locking PDF files to devices so they cannot be easily shared with others.  Combined with transparent key delivery, this can provide the ultimate in PDF protection.

A WORD OR WARNING: make sure any PDF DRM system you purchase does not force users to remove or lower their security for it to work.  Some DRM plugins do this.  Other PDF DRM solutions force users to enable JavaScript in their PDF Reader.  This is a really bad idea since hackers send out malicious PDF files that use JavaScript to gain control of user’s computer systems.  The result of a user clicking on a malicious PDF file and it causing them harm could therefore result in you being sued.

  Are passwords, certificates, or neither best for PDF encryption?


In summary, there are many ways you can protect PDF files, from using password and certificate encryption, digital signatures, licensing and DRM controls.  The method you choose for your business will depend on how confidential, sensitive or valuable your PDF documents are and whether you just want to securely send PDF files, protect them while they are being stored, share PDF files securely, sell them, or just control how they are used.

Clearly passwords or certificates are of no use if you want to enforce PDF restrictions such as stopping editing, copying, and printing, since they can be easily removed.

What you need to bear in mind is if the protection can be easily bypassed or removed then there is no point in applying it to begin with.

If you want to protect PDF files without passwords or certificates, stop sharing, and enforce edit, print and copy restrictions then take a free 15 day trial of our PDF DRM software.

Tags: certificates, digitally sign pdf, encrypt pdf, encryption, passwords, pdf certificate encryption, pdf certificate protection, pdf certificate security, pdf digital signatures, pdf drm, pdf encryption, pdf password encryption, pdf password protection, pdf password security, pdf restrictions, protect pdf file, protect pdf without certificate, protect pdf without password, protecting pdf files
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: How to lock a PDF Link to: How to lock a PDF How to lock a PDFLink to: How to add a confidential watermark to a PDF document that is permanent Link to: How to add a confidential watermark to a PDF document that is permanent How to add a confidential watermark to a PDF document that is permanent
Scroll to top Scroll to top Scroll to top