Public Key Infrastructure
In this lesson, we will understand the concept of public key infrastructure and see how certificate authority works.
We'll cover the following...
We have seen how Hash functions and asymmetric encryption can help us digitally sign any message.
On an open or insecure internet, in order for a receiver(Bob) to verify a signature done by a sender(Alice), he needs Alice’s public key beforehand.
If Alice was to send her public key to Bob on the internet, how can Bob be sure that it is really Alice who has sent him her key and not Chris pretending to be Alice?
For the entire secure communication ...