PKI Fundamentals
  • What is Public Key  Infrastructure?
  • Components of a PKI
  • What is a Digital Certificate?
  • What is Encryption?
  • General Operation
  • Digital Signature
    • Bob creates a message.
    • Bob selects the message to be digitally signed in the email client he is using.
    • A hash function is enacted, creating a message digest from the message. The message digest is then encrypted by Bob's private key. Thus the Digital Signature is created. NOTE: Bob's public key is sent with the message and is part of the PKI Fundamentals.
    • The message is then sent to Stephanie.
    • Stephanie's hash function creates a message digest from the message. Stephanie's message digest is checked against Bob's message digest, which is stored in Bobs public key.
    • Since both message digests match, Stephanie knows that the message has not been altered and that Bob is the true originator of the message.