How does a digital certificate prove authenticity?
Imagine the following scenario:
We have Bob that wants to send a message to Alice. Both have a public/private key. Bob uses his private key to sign the digest (hash of the message) with it’s private key, and sends along it the plain text m… Continue reading How does a digital certificate prove authenticity?