Public-Key Cryptography (Cont.)





It performs the following eight steps:

  1. Secure page request (https://...), where HTTPS (Hyper Text Transfer Protocol Secure) is the secure version of HTTP, and all communications between your browser and the website are encrypted.

  2. Public key + digital certificate, where digital certificate is a digitally signed document that serves to validate the sender’s authorization and name. The Certification Authority (CA) attests that the sender’s name is the one associated with the public key in the document.

  3. Certificate verification (server.cer), where server certificates (server.cer) are basically used to identify a server. The CA verifies identity and legitimacy of company that requested a certificate and if the verification is successful, CA issues signed certificate.

  4. Public key + encrypted URL data + session data, where the browser then uses the public key to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted HTTP data.



      If your coffee shop has one of those passive aggressive    
      “no wifi pretend it’s the old days” signs,    
      I’m going to smoke in there and pay 50 cents for coffee.