Security
Authentication
Public key cryptography
- Any message encrypted with some public key can only be decrypted by its corresponding private key.
- Anyone with the public key can verify that a message or signature was created by the corresponding private key.
Public key capabilities: Signature verification and encryption Private key capabilities: Decryption
Certificate based authentication
Certificate authorities (CAs): Issues certificate to entities after verifying their identity and authenticity.
Certificate content
- Issuer
- Subject/subject alternative name
Certificate revocation list: List of certificates (mostly compromised) which are revoked by the CA
Certificate check
- First check is to verify if the certificate comes from a trusted CA
- Subject/subject alternative name - tells who the certificate is for
- Revocation list check