Mishra wrote: Trying to solidify my PKI knowledge here... Every book I've read tells you each part of PKI but doesn't ever really tell you the entire process that goes into 2 unknown PCs wanting to exchange data with each other. So I made a make shift scenario. What do you think? CompA wants to exchange communication with CompBB. CompA asks for a digital certificate to be sent from the CA to get their public key to start encrypting data. Because CompA trusts the CA then he will freely receive the certificate and use it when he can. CompBB asks for the same certificate on CompA. Now each PCs have their public keys as well as information. CompA readies a packet that he wants to send to CompB. CompA will use the documents contents to create a hash value of the message. You then sign the message with your private key to ensure the identity of you, then you encrypt the message with CompBB's public key making it inaccessible. You then send the message. CompBB receives the message and decrypts the message with his private key giving him access to the packet. He then decrypts the digital signature by using CompA's public key he received in the certificate and knows that definitely came from CompA. He then creates a hash of the message and checks it with the sent hash to make sure that the original message has not been tampered with. Once that is complete then he has access to read the data inside.
sprkymrk wrote: Mishra that is essentially correct as far as I can tell. Did you just want someone to verify, or do you have a specific question?
Mishra wrote: Cracking open the study material again... I'm so lost on where I am with this cert. It's tough to read over things like the DNS section when everything still feels like I have learned/know it... But then I get to the exam and don't know something. Snadam where are you on this one?