| IF EVERYONE IS REGISTERED WITH SOME C.A., SECURE COMMUNICATION IS
POSSIBLE AS LONG AS THE PUBLIC KEYS FOR THE C.A.'s ARE DISTRIBUTED
RELIABLY.
   YOUR WEB BROWSER ACTUALLY COMES WITH THE PUBLIC KEY FOR SOME
C.A. PRE-INSTALLED.
 WHEN ALICE WANTS TO START AN ENCRYPTED CONVERSATION WITH BOB
	SHE SENDS BOB THE COPY OF HER PUBLIC KEY SIGNED BY THE C.A.
 BOB USES HIS COPY OF THE C.A.'s PUBLIC KEY TO VERIFY THAT
	ALICE'S KEY WAS SIGNED (AND CERTIFIED) BY THE C.A.
 BOB CAN NOW SAFELY USED ALICE'S PUBLIC KEY TO ENCRYT MESSAGES
	SENT TO ALICE.
 
		
	       
       |