Verifying authenticity

In reality, there is no person (or computer) on the internet whose job it is to monitor each client/server transaction. So, who or what is Cathy and how did Cathy know to warn Alice?

Figure 6. Cathy, a third-party Certificate Authority signs Bob’s credentials


Cathy, a third-party Certificate Authority signs Bob’s credentials

Cathy is a file known as a certificate of authentication owned and distributed by a Certificate Authority (CA). Bob also is a certificate of authentication. Ahead of time, Bob’s company sent its certificate to Cathy’s company, which verified Bob’s company identity and signed his certificate.

When Alice installed her browser, Cathy’s certificate was installed in Alice’s browser’s Trust Store. As the name implies, a Trust Store contains certificates from trusted entities.

Figure 7. Secure communication: the signatures match


Secure communication: the signatures match

As soon as Alice contacts Bob, he sends her his certificate. Alice’s browser checks the signature on Bob’s certificate against the signature on Cathy’s certificate in its Trust Store. The signatures match and Alice’s browser authorizes the beginning of a trusted connection between Alice and Bob.

Figure 8. Rejected communication: the signatures do not match


Rejected communication: the signatures do not match

Alice’s browser immediately rejects Bart’s certificate because it was not signed by Cathy. Its signature does not match the signature on Cathy’s certificate in Alice’s browser’s Trust Store.