Introduction
Imagine you want to send a secret message to a friend but worry someone might read it on the way. Public Key Infrastructure helps solve this problem by creating a safe way to share secret messages and verify who is who online.
Imagine sending a locked box to a friend. The box has a unique lock (public key) that anyone can use to lock it, but only your friend has the key (private key) to open it. A trusted locksmith (Certificate Authority) gives your friend an ID card proving they own the key, so you know the box will be safely opened only by them.
┌───────────────┐
│ Root CA │
│ (Trusted) │
└──────┬────────┘
│ Signs
┌──────▼────────┐
│ Intermediate │
│ CA │
└──────┬────────┘
│ Signs
┌──────▼────────┐
│ End-User │
│ Certificate │
└───────────────┘