Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, the correct order of this chain is represented as –
(a) X2 X1 X1 B
(b) X1 X1 X2 A
(c) X1 X2 X2 B
(d) X1 X2 X2 A
The question was posed to me by my college director while I was bunking the class.
Question is taken from Overview topic in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security