Certificate Authentication

Certificate

Certificate Authority

Certificate Authentication

certificate

The attackers is impossible to substitute the public key for their own one because the public key will be encrypted by the CA's private key. If the attackers replace the public key with their own one, then the hash value of the Certificate will be different from the decrypted Signature. Thus, the certificate can be a valid proof for authenticating the identification unless the private key paired with the public key is leaked out.

References

results matching ""

    No results matching ""