# Alice wants to communicate with Bob, using public-key cryptography.She establishes a connection to someone she hopes is Bob.She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed by the root CA.Alice already has the public key of the root CA.What steps does Alice carry out to verify that she is talking to Bob?Assume that Bob does not care who he is talking to (e.g., Bob is some kind of public service).

Question
Asked Dec 10, 2019
83 views

Alice wants to communicate with Bob, using public-key cryptography.

She establishes a connection to someone she hopes is Bob.

She asks him for his public key and he sends it to her in plaintext along with an X.509 certificate signed by the root CA.

Alice already has the public key of the root CA.

What steps does Alice carry out to verify that she is talking to Bob?

Assume that Bob does not care who he is talking to (e.g., Bob is some kind of public service).

check_circle

Step 1

In the cryptology X.509 is a standard certification...

### Want to see the full answer?

See Solution

#### Want to see this answer and more?

Solutions are written by subject experts who are available 24/7. Questions are typically answered within 1 hour.*

See Solution
*Response times may vary by subject and question.
Tagged in