Summary

This chapter covers some significant ground. The whole area of using certificates to verify identity falls apart without some way of validating that a certificate has or hasn't been revoked. A certificate might be revoked for many reasons, not the least of which might be that the private key associated with the certificate has been compromised and is in the possession of someone other than the person you think it belongs to. As a result, this is a key area of functionality for building applications that communicate securely.

In the next chapter, you'll look at digital signatures, how to create them, and how to validate them. Digital signatures go hand-in-hand with digital certificates and are a key piece to verifying that messages and ...

Get Developing Secure Applications with Visual Basic now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.