Please, correct my understanding about certificates.
Bob's public certificate consists of:
Bobs ID
Bobs public key
Hash of information above
Hash, encrypted with CA private key.
Recipient uses certificate in order to know Bob's public key that will be used to encrypt messages to Bob.
Recipient decrypts certificate hash by using CA public key and compares with with hash defined in certificate. This allows recipient to know certificate is real.
Certificate is used in asymmetric encryption case.