|
IF EVERYONE IS REGISTERED WITH SOME C.A., SECURE COMMUNICATION IS
POSSIBLE AS LONG AS THE PUBLIC KEYS FOR THE C.A.'s ARE DISTRIBUTED
RELIABLY.
- YOUR WEB BROWSER ACTUALLY COMES WITH THE PUBLIC KEY FOR SOME
C.A. PRE-INSTALLED.
- WHEN ALICE WANTS TO START AN ENCRYPTED CONVERSATION WITH BOB
SHE SENDS BOB THE COPY OF HER PUBLIC KEY SIGNED BY THE C.A.
- BOB USES HIS COPY OF THE C.A.'s PUBLIC KEY TO VERIFY THAT
ALICE'S KEY WAS SIGNED (AND CERTIFIED) BY THE C.A.
- BOB CAN NOW SAFELY USED ALICE'S PUBLIC KEY TO ENCRYT MESSAGES
SENT TO ALICE.
|