ATOC 184 Lecture Notes - Lecture 12: Verisign, Public-Key Cryptography
Document Summary
Signing: the private key holder can use my private key to take my message and generate a signature that is inexplicably linked to the document. Provable that it can only be produced by the holder of the private key. Can send this signed document out into the world. Signature check: take the public key, take the document in question, was this produced by the private key associated with it. All your traffic passes through a hacked system. If they can modify all your public keys, they can modify information to and from verisign. Bank will ask you to sign your public key. So you don"t have to talk to verisign. There are websites that don"t have signed public keys or no signed certificates. Certificate should contain the public key and the signature of the public key. The bank wants to prove it owns rbc. ca. Signs the bank public key, plus the domain with verisign"s private key.