All correct for authentication.  There are times that public keys or
certificates are encrypted using a DH protocol for privacy.  You might
not want a man in the middle to track where you go, and a certificate
is your identity.

> From: Joshua Juran <[EMAIL PROTECTED]>
> Date: Wed, 18 May 2005 15:31:52 -0400
> 
> 
> Certificates aren't encrypted.  They're used to establish the 
> encryption in the first place.
> 
> There's no such thing as 'intercepting' a certificate.  You'll notice 
> that this message has a certificate attached.  You can't 'intercept' it 
> because I'm not intending to prevent you from receiving it.  In fact, 
> I'm intending that you *do* receive it.
> 
> Now that you have my certificate, you can create a message encrypted 
> such that only I can read it -- since only I have the private key 
> needed to decrypt it.  The mirror image of public key encryption is 
> digital signature.  I sign with my private key, and the public key 
> verifies the signature -- that the signer must be holding the private 
> key.
> 
> A certificate is an assertion of identity of a keyholder.  Mine says 
> "The key used to sign this message belongs to [EMAIL PROTECTED]"  
> It makes no guarantees about my personal identity (e.g. my real name) 
> but from it you can conclude that the message was sent by the owner of 
> this mailbox and wasn't forged by someone else.  Should you believe 
> what my certificate says?  Well, it was signed by Thawte, so if you 
> trust them, then yes.
> 
> Once you trust my certificate, you can use it for encrypting messages 
> to me.

-- 
Ken Goldman   [EMAIL PROTECTED]   914-784-7646
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to