Answer the question
In order to leave comments, you need to log in
How does RSA work with public Key + Certificate?
I have an example original request that looks like this:
1) base64 Data
2) base64 RSA certificate chain including root CA
3) base64 Signature (SHA1+RSA) Data verified with a certificate (point 2).
Knowing the Public Key, the data is signed and sent to the server, which can decrypt the signature and compare the hash to make sure the data has not been changed.
Question: I do not understand how this technology can guarantee that the data has not been changed, because we have a Public Key, which means we can change the data, sign it and send it to the server. That it was impossible to make the certificate serves?
What prevents us from copying the certificate from the original request and sending it along with other data? The validity period of the certificate is not checked by the server in my case.
Please explain to me what role the certificate has in this chain.
Answer the question
In order to leave comments, you need to log in
Yes, everything is simple - there are 2 keys and data is encrypted with a private key, and they are only decrypted with a public key. While the private key has not been given to anyone, everyone is happy and everything is fine.
As for the chain of certificates, the entire chain is not involved in the encryption process. These certificates are needed to validate subsequent
because we have a Public Key, which means we can change the data, sign it and send it to the server
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question