How SSL Certificates Work: A Story of Keys, Trust, and Secure Connections
Kubenatives Newsletter - Edition #13
🏰 The Kingdom of Trust: A Story of SSL Certificates and Encryption
In a great kingdom, the Royal Messenger (RM) is responsible for delivering messages securely between the King and his people. However, spies and impostors roam the land, trying to forge fake letters and steal secret messages.
To solve this, the King orders the creation of a two-key system—a magical set of keys that allows secure communication.
🔑 The Royal Keys: Public and Private Keys
The Royal Messenger (RM) receives two keys:
Public Key (🔵 Blue Key) → A key that everyone in the kingdom can have.
Private Key (🟠 Orange Key) → A secret key kept only by the RM.
But how do these keys work? The kingdom has two major problems to solve:
How can people send private messages to the RM without anyone else reading them?
How can people verify that a message really came from the RM and not from an impostor?
🔹 These problems lead to two types of encryption workflows.
Scenario 1: Sending Secret Messages (Public Key for Encryption)
A citizen named Alice wants to send a confidential letter to the RM, but she fears that spies might intercept it.
To ensure only the RM can read the message:
Alice uses the RM’s public key (🔵) to lock (encrypt) the message.
She sends the encrypted letter to the RM.
Only the RM, who holds the private key (🟠), can unlock (decrypt) the message.
✅ Even if a spy intercepts the message, they cannot read it—only the RM has the private key to unlock it.
📌 Real-world parallel:
When you visit a secure website (https://example.com), your browser encrypts information using the website’s public key.
Only the website’s private key can decrypt your information.
Scenario 2: Proving Authenticity (Private Key for Signing)
Keep reading with a 7-day free trial
Subscribe to Kubenatives Newsletter to keep reading this post and get 7 days of free access to the full post archives.