August 2019
Intermediate to advanced
786 pages
20h 22m
English
In the previous section, we looked at a scenario where Simran was sending encrypted and digitally signed data to Brian. During the process, we saw how Simran and Brian used each other's private and public keys. A public key has to be shared between two parties. Now, the problem we have is to work out how exactly the system knows that Brian's public key is his, and not from someone that is pretending to be Brian? In order to overcome this challenge, we can use certificates to verify whether shared public keys are from their purported source. Let's introduce certificates to the previous example and see how things would work.
The digital signature process works as follows: