Public key infrastructure with the Dogtag certificate system

TAG MASTER

Author(s):

If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system.

Asymmetric cryptography provides a powerful and convenient means for encrypting Internet communications. In this scenario, each entity involved in the encryption system possesses a pair of keys: a public key and a private key. The public key is used to encrypt data or to validate signatures. Data encrypted with the public key is then decrypted with the matching private key.

If Alice wants to send an encrypted message to Bob, she needs to obtain Bob’s public key for her key ring. Encryption software on Alice’s computer then uses Bob’s public key to encrypt the message, and Bob’s computer uses Bob’s private key to decrypt it.

Read full article as PDF:

051-055_dogtag.pdf (766.80 kB)

Related content

comments powered by Disqus

Direct Download

Read full article as PDF:

051-055_dogtag.pdf (766.80 kB)

News