From the course: Learning Cryptography and Network Security

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Navigating certificates

Navigating certificates

From the course: Learning Cryptography and Network Security

Start my 1-month free trial

Navigating certificates

- [Instructor] Let's take a look at what goes into creating a certificate. When creating a certificate within the public key infrastructure, we have some players. Up at the top we have the certificate authority, and then within that the certificate authority's public key and private key On the left, we see Alice, Alice has a public key and a private key. And on the right we see Bob who also has a public key and a private key. We need to exchange keys. Alice needs Bob's public key and Bob needs Alice's public key. First, Alice and Bob both give their public key to the certificate authority. Now, once the certificate authority has those keys we need to create the certificate. On the left and also on the right you see that we start out with an unsigned certificate. The unsigned certificate contains the user ID and the user's public key. On the left we see that it contains Alice's public key and on the right, it contains…

Contents