Sends the unsigned certificate to a ca in a secure

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: es an unsigned certificate that includes a user ID and the user's public key – The client then sends the unsigned certificate to a CA in a secure manner Public Key Certificates • Step 2 – A CA creates a signature by calculating the hash code of the unsigned certificate and encrypting the hash code with the CA's private key • The encrypted hash code is the signature – The CA attaches the signature to the unsigned certificate and returns the now signed certificate to the client Public Key Certificates • Step 3 – The client may send its signed certificate to any other user – That user may verify that the certificate is valid by • Calculating the hash code of the certificate (not including the signature) • Decrypting the signature using the CA's public key • Comparing the hash code to the decrypted signature. Public Key Certificates • If all users subscribe to th...
View Full Document

This note was uploaded on 06/03/2013 for the course IS e.g.101 taught by Professor Dr.mahmoudmostafa during the Fall '12 term at Ain Shams University.

Ask a homework question - tutors are online