| |
Summary
This section summarizes the basic PKI protocol and some important concepts that
you should remember to use this software effectively.
Basic PKI Protocol
To help you remember the basic PKI protocol, think about the following scenario:
- Bob gets Alice's public key (certificate).
- Bob signs his message with his private key.
- Bob encrypts his message with Alice's public key (certificate).
- Bob sends the signed and encrypted message to Alice.
- Alice receives the signed and encrypted message.
- Alice decrypts the signed and encrypted message using her private key.
- Alice verifies Bob's signature using his public key (certificate).
Something to Remember
- When encrypting, you use someone's public key (may be yours).
- When signing, you use your private key.
- When decrypting, you use your private key.
- A certificate is owned by a user and is identified by the user's name and email
address.
|