Public key infrastructure

Root certificate

In cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA). Root certificates are self-signed (and it is possible for a certificate to have multiple trust paths, say if the certificate was issued by a root that was cross-signed) and form the basis of an X.509-based public key infrastructure (PKI). Either it has matched Authority Key Identifier with Subject Key Identifier, in some cases there is no Authority Key identifier, then Issuer string should match with Subject string (RFC 5280). For instance, the PKIs supporting HTTPS for secure web browsing and electronic signature schemes depend on a set of root certificates. A certificate authority can issue multiple certificates in the form of a tree structure. A root certificate is the top-most certificate of the tree, the private key which is used to "sign" other certificates. All certificates signed by the root certificate, with the "CA" field set to true, inherit the trustworthiness of the root certificate—a signature by a root certificate is somewhat analogous to "notarizing" identity in the physical world. Such a certificate is called an intermediate certificate or subordinate CA certificate. Certificates further down the tree also depend on the trustworthiness of the intermediates. The root certificate is usually made trustworthy by some mechanism other than a certificate, such as by secure physical distribution. For example, some of the best-known root certificates are distributed in operating systems by their manufacturers. Microsoft distributes root certificates belonging to members of the Microsoft Root Certificate Program to Windows desktops and Windows Phone 8. Apple distributes root certificates belonging to members of its own root program. (Wikipedia).

Root certificate
Video thumbnail

Let’s Learn The Rational Root Theorem….Step-by-Step….

TabletClass Math: https://tcmathacademy.com/ Math help with solving a polynomial equation using the rational root theorem. For more math help to include math lessons, practice problems and math tutorials check out my full math help program at https://tcmathacademy.com/ Math Notes:

From playlist Pre-Calculus / Trigonometry

Video thumbnail

Certificates - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Given a Rooted Tree, Determine Relationships

This video analyzes the relationships of vertices in a rooted tree. mathispower4u.com

From playlist Graph Theory (Discrete Math)

Video thumbnail

Introduction to Rooted Trees

This video introduces rooted trees and how to define the relationships among vertices in a rooted tree. mathispower4u.com

From playlist Graph Theory (Discrete Math)

Video thumbnail

AQA Core 3 9.01a Locating Roots

I look at how we can show that a curve has a root between two values on the x-axis.

From playlist [OLD SPEC] TEACHING AQA CORE 3 (C3)

Video thumbnail

Rooting a tree | Graph Theory

How to root a tree at a particular node Support me by purchasing the full graph theory course on Udemy which includes additional problems, exercises and quizzes not available on YouTube: https://www.udemy.com/course/graph-theory-algorithms Algorithms repository: https://github.com/willi

From playlist Tree Algorithms

Video thumbnail

Signature Validation - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Certificate Details - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

What is a DOUBLE ROOT? Must Know This In ALGEBRA!

TabletClass Math: https://tcmathacademy.com/ Algebra help with double roots, quadratic equations, type of roots, zeros and solutions to include real and imaginary. For more math help to include math lessons, practice problems and math tutorials check out my full math help program at ht

From playlist GED Prep Videos

Video thumbnail

70-640 Certificate Services / 2008 R2 - Installing a Single Tier PKI (Detailed)

In this video we will demostrate all the details of how to install a single Tier Windows Server 2008 R2 Enterprise Root CA. This video is loaded with hints and tips to watch for durning the install. The perfect video for someone with a small company that want to setup a super simple PKI in

From playlist Cryptography, Security

Video thumbnail

#232 How to secure our devices using SSL (ESP8266, ESP32, Tutorial)

Most of our IOT devices are insecure and vulnerable. It’s high time to learn how to make them more secure, also because unsecured devices will no more be able to use valuable services without using the HTTPS protocol. Already now, Google services, for example, do no more accept unsecured c

From playlist ESP32

Video thumbnail

DEFCON 18: An Observatory for the SSLiverse 2/4

Speakers: Peter Eckersley, Jesse Burns This talk reports a comprehensive study of the set of certificates currently in use on public HTTPS servers. We investigate who signed the certs, what properties they have, and whether there is any evidence of malicious certificates signed, directl

From playlist DEFCON 18-1

Video thumbnail

27c3: Is the SSLiverse a safe place? (en)

Speakers: Jesse ,Peter Eckersley An update on EFF's SSL Observatory project The EFF SSL Observatory has collected a dataset of all TLS/HTTPS certificates visible on the public web. We discuss this dataset - what we have learned from it, how you can use it, and how intend to offer a live,

From playlist 27C3: We come in peace

Video thumbnail

23C3: Building an Open Source PKI using OpenXPKI

Speakers: Alexander Klink,Michael Bell Take a lot of Perl, add some OpenSSL, sprinkle it with a few HSMs, stir, season to taste, enjoy! OpenXPKI is an open source trust center software, written by the OpenXPKI Project, which aims to create an enterprise-scale PKI solution. You can see

From playlist 23C3: Who can you trust

Video thumbnail

OWASP AppSec USA 2010: State of SSL on the Internet: 2010 Survey Results and Conclusions 2/3

Speaker: Ivan Ristic, Qualys More information can be found on the OWASP website: http://bit.ly/hY4bqh Source: http://bit.ly/owasp_appsec_us_2010

From playlist OWASP AppSec USA 2010

Video thumbnail

Masterclass in openSSL

In this masterclass video you have 1 hour in depth education in using openSSL in Linux. We first look at self-signed openSSL certificates but see their limitation. From there on we go through and create the full PKI hierarchy of the openSSL Root Certificate , an intermediate CA and server

From playlist LPIC-3

Video thumbnail

OWASP AppSec EU 2013: Qualitative Comparison of SSL Validation Alternatives

For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speakers: Michael Brenner | Sascha Fahl | Sascha Fahl | Matthew Smith Although SSL/TLS is in widespread use today, certificate validation currently suf

From playlist OWASP AppSec EU 2013

Video thumbnail

Primitive Roots Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Related pages

Public key certificate | SHA-1 | StartCom | DigiNotar | Verisign | Electronic signature | Tree structure | Computer security | X.509 | DigiCert | Online Certificate Status Protocol | Certificate authority | Self-signed certificate | Cryptography | Public key infrastructure