![]() etc and also adds an encrypted text (= digital signature) to the certificate and finally encrypts the whole certificate with the public key of the server and sends it back to the website owner. He gives a Certificate Signing Request file (CSR) and his public key to the CA.ĬA then creates a personal certificate based on CSR including domain name, owner name, expiry date, serial no. Website owner first generates a public key and private key, keeping the private key secret. Now, others can only encrypt the data using the public key and that data can only be decrypted by the private key of Jerry.Īnother approach is to use public keys to only decrypt the data and private keys to only encrypt the data. He makes many copies of that public key and shares with others. Suppose Jerry generates a private key and public key. ![]() Private keys are meant to be kept private. Public keys are keys which can be shared with others. Keys are nothing but long random numbers used to encrypt/decrypt data. Who are CA’s (Certificate Authorities)?ĬA’s are globally trusted companies like GoDaddy, GeoTrust, VeriSign etc who provide digital certificates to the websites. An authenticated website has a unique personal certificate purchased from one of the CA’s. To verify whether the website is authenticated/certified or not (uncertified websites can do evil things).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |