Security

Authentication

Public key cryptography

  1. Any message encrypted with some public key can only be decrypted by its corresponding private key.
  2. Anyone with the public key can verify that a message or signature was created by the corresponding private key.

Public key capabilities: Signature verification and encryption Private key capabilities: Decryption

Certificate based authentication

Certificate authorities (CAs): Issues certificate to entities after verifying their identity and authenticity.

Certificate content

  • Issuer
  • Subject/subject alternative name

Certificate revocation list: List of certificates (mostly compromised) which are revoked by the CA

Certificate check

  • First check is to verify if the certificate comes from a trusted CA
  • Subject/subject alternative name - tells who the certificate is for
  • Revocation list check

References

© 2025 All rights reservedBuilt with Flowershow Cloud

Built with LogoFlowershow Cloud