Answer the question
In order to leave comments, you need to log in
How is public key certification formed?
There is a standard asymmetric encryption algorithm (let it be RSA).
A question regarding the certification of public keys by a certification authority for organizing end-to-end encryption.
Question - how does certification occur and the signature is verified?
Wiki excerpt:
A public key certificate is issued by a certification authority and consists of such fields as:
- the public key of the certificate owner itself,
the validity period,
- the name of the issuer (certificate authority),
- the name of the certificate owner
- and, the most important part, the digital signature.
The digital signature ensures that the certificate cannot be tampered with. It is the result of a cryptographic hash function of the certificate data, encrypted with the CA's private key.
{
"public_key": "здесь открытый, для которого и создаётся сертификат",
"sertification_center_name": "название центра сертификации",
"sertificate_owner_name": "имя владельца сертификата",
"sign": "MD5 хэш всех этих данных после того, как они были зашифрованы закрытым ключом центра сертификации"
Answer the question
In order to leave comments, you need to log in
A certificate with a key has a unique ID by which they identify each other; the key of someone else's certificate is useless. And besides, it is considered that the key of the certificate is stored in a safe place and is not available to anyone. Key leak = certificate compromise.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question