IAO201 C
IAO201 C
IAO201 C
This method ensures that the message came from Alice because only Alice has access
to her private key. Anyone with access to Alice's public key (which is everyone,
since it's public) can verify that the message was indeed encrypted (signed) using
Alice's private key. If Alice used her public key or Bob's public or private keys,
the message would either not be securely transmitted or would not serve as proof of
Alice's identity to Bob.
Q3.2
When a CA issues a certificate to a website, the purpose of the certificate is to
provide a trusted link between the website and the users who visit it. The
certificate contains the public key of the website (in this case, Amazon.com's
public key) so that visitors (like Alice in the browser) can establish a secure,
encrypted connection using that public key.
Amazon sends a certificate signing request (CSR) to the CA. The CSR includes
Amazon's public key and some additional information that identifies the website
(like domain name, company name, etc.).
The CA verifies the identity of Amazon.com and the ownership of the domain.
Once verified, the CA signs the certificate using its own private key (SCA). This
signature allows end-users to verify that the certificate is indeed issued by a
trusted CA.
The signed certificate, now containing Amazon.com's public key and the CA's
signature, is sent back to Amazon.com.
The certificate does not contain Amazon's private key (SM) because that remains
secret and is never shared. Only the public key, which is meant to be distributed
to users, is included in the certificate.