Public-Key Infrastructure (PKI)
Explore the role of public-key infrastructure in distributed systems to secure communication by authenticating entities through certificates. Understand certificate issuance, certificate chains, and revocation mechanisms that help maintain trust and integrity during data exchange.
When using the public-key cryptography, one common problem is that how can a client ensure the server is who they claim to be?
In theory, a malicious party could generate a second keypair and present the public key to us, which we would use to encrypt to send the data. Even though the data is encrypted, they can stil be sent to the wrong party, who would be able to then decrypt them with their private key. To ensure the client is talking to the server it expects, we can make use of certificates.
Certificates
Certificates are digital documents that bind a public key to a specific entity. They are ...