pki puzzle

davidwong

Beta member
Messages
1
hey guys:
i have study the system security for a couple of years,but the theory of how pki work truly puzzle me even today.
it says in the pki,that the CA issue a certificate for certain objective to a user as a public key,for security issues particularly including data confidentiality and integrity when transmitted over the insecure network,using by no matter exactly which software.
for confidentiality:
the sender of a piece of data recieve the public key from recipient
and use that for encryption using a open algorithm which is well
known,while the recipient having received the data,use his private key
to reverse the data ,which is originally encrypted by the his own
key,using his private key.
so what is the trick in the internal encrypt using public key of his
own while decrypt using his private key.

when turning to integrity whose damage,according to reference are
usually done by man-in-the-middle:
the sender send the data of data signature using his private key
to the recipient,who in turn validate that the data is from the data
the source that claims himself to be the intended sender.
so what is that trick.

in the layer of system adminstrator,do i need to know the detail or do
i simply see it as a black box
 
Back
Top Bottom