Sign and verify messages using public key cryptography
Create a public/private key pair for signing and verification
Used to sign messages. Never share this!
Used to verify signatures. Can be shared with anyone.
Enter a message and sign it with your private key
Verify that the signature is valid using the public key
See what happens when you modify a signed message
Understand how trust flows from root CA to end-entity certificates
Subject: GlobalTrust Root CA
Issuer: Self-signed
Status: Pre-trusted (in browser/OS)
This certificate is self-signed and trusted because it's pre-installed
Subject: GlobalTrust Intermediate CA
Issuer: GlobalTrust Root CA
Status: Trusted (signed by Root CA)
This certificate's signature can be verified using the Root CA's public key
Subject: www.example.com
Issuer: GlobalTrust Intermediate CA
Status: Valid (verified through chain)
This certificate proves the website's identity and provides its public key
Use case: Secure web browsing
How it works:
What it proves: Website identity and encryption capability
Use case: Verify email sender and detect tampering
How it works:
What it proves: Sender authenticity and message integrity
Use case: Verify software hasn't been tampered with
How it works:
What it proves: Software authenticity and developer identity
Use case: Authorize cryptocurrency transfers
How it works:
What it proves: Ownership and authorization to spend
A digital signature is a mathematical scheme that proves:
How it works:
Key pair: Two mathematically related keys generated together
Properties:
For signatures:
For encryption:
A digital certificate binds a public key to an identity (person, website, organization).
Certificate contains:
Purpose: Without certificates, how do you know a public key actually belongs to who you think it does? Certificates solve this by having a trusted CA vouch for the binding.
A Certificate Authority is a trusted entity that issues digital certificates.
What CAs do:
Trust model:
Major CAs: DigiCert, Let's Encrypt, GlobalSign, Sectigo
The certificate chain (or chain of trust) connects an end-entity certificate to a trusted root CA.
Chain structure:
Why intermediates?
Messages are hashed before signing for three reasons:
Example:
Digital signatures are tamper-evident:
Even tiny changes break signature:
Important: This proves message was tampered with, but signature itself remains valid for the original message.