Is it possible to create a certificate for a key pair which I do not possess?

Perhaps the answer is no, and perhaps this is a dumb question. However I am trying to understand the underlying principles better.
My understanding of certificate signing process.

I generate a key pair.
I create a CSR. [CSR is essentially… Continue reading Is it possible to create a certificate for a key pair which I do not possess?

What’s the merit of storing LTV (long term validation) information for RFC3161 tokens and what happens if a TSA private key would leak?

I’ll formulate my question in regards to timestamped PDF, but I wonder actually about the long term validation of RFC3161 tokens in general.
So, PAdES has the concept of Long Term Validation, which means (correct me if I’m wrong), that a d… Continue reading What’s the merit of storing LTV (long term validation) information for RFC3161 tokens and what happens if a TSA private key would leak?

Verify that data submitted by user was produced by my app

I’m designing an app (for PC), that is intended to run on users’ machines and generate a file with some data. The user will then upload the file to the server, and I want to verify that this file has been produced by my app and hasn’t been… Continue reading Verify that data submitted by user was produced by my app

Digital Signature uses private key for encryption, and public key for decryption? [duplicate]

Public key is for encryption, and private key is for decryption in PKIs.
And digital signature employs the PKIs.
How to use a private key for encryption, and using public key for decryption which violate asymmetric cryptography?
from geeks… Continue reading Digital Signature uses private key for encryption, and public key for decryption? [duplicate]