Sai Keerthan Kasulakeerthankasula.hashnode.dev·May 5, 2024Part 3 : The public key infrastructure and certificate managementWith respect to my previous articles, I explained how encryption and decryption are performed, including the elements used for the hybrid encryption. As we know, we use two keys for asymmetric encryption: a public key and a private key. The term "pub...DiscussCertificate Exchange
Murtaza Udaipurwalablog.murtazau.xyz·Feb 24, 2024A Practical Guide to Self-Signed X.509 Certificates Using OpenSSLCertificate Authority (CA) The CA serves as the root authority. All certificates generated for different services will be signed by it. Let's create our CA first. mkdir ca openssl req \ -x509 \ -newkey rsa:4096 \ -days 365 \ -nodes \...Discuss·97 readsopenssl