Global Information Lookup Global Information

Root certificate information


Root certificate
The role of root certificate as in the chain of trust.

In cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA).[1] Root certificates are self-signed (and it is possible for a certificate to have multiple trust paths, say if the certificate was issued by a root that was cross-signed) and form the basis of an X.509-based public key infrastructure (PKI). Either it has matched Authority Key Identifier with Subject Key Identifier, in some cases there is no Authority Key identifier, then Issuer string should match with Subject string (RFC 5280). For instance, the PKIs supporting HTTPS[2] for secure web browsing and electronic signature schemes depend on a set of root certificates.

A certificate authority can issue multiple certificates in the form of a tree structure. A root certificate is the top-most certificate of the tree, the private key which is used to "sign" other certificates. All certificates signed by the root certificate, with the "CA" field set to true, inherit the trustworthiness of the root certificate—a signature by a root certificate is somewhat analogous to "notarizing" identity in the physical world. Such a certificate is called an intermediate certificate or subordinate CA certificate. Certificates further down the tree also depend on the trustworthiness of the intermediates.

The root certificate is usually made trustworthy by some mechanism other than a certificate, such as by secure physical distribution. For example, some of the best-known root certificates are distributed in operating systems by their manufacturers. Microsoft distributes root certificates belonging to members of the Microsoft Root Certificate Program to Windows desktops and Windows Phone 8.[2] Apple distributes root certificates belonging to members of its own root program.

  1. ^ "What Are CA Certificates?". Microsoft TechNet. 2003-03-28.
  2. ^ a b "Windows and Windows Phone 8 SSL Root Certificate Program (Member CAs)". Microsoft TechNet. October 2014.

and 24 Related for: Root certificate information

Request time (Page generated in 0.8625 seconds.)

Root certificate

Last Update:

computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA). Root certificates are self-signed (and...

Word Count : 789

Offline root certificate authority

Last Update:

An offline root certificate authority is a certificate authority (as defined in the X.509 standard and RFC 5280) which has been isolated from network...

Word Count : 487

Public key certificate

Last Update:

a self-signed certificate, called a root certificate, trust anchor, or trust root. A certificate authority self-signs a root certificate to be able to...

Word Count : 4444

Certificate authority

Last Update:

certificate may be shared among multiple CAs or their resellers. A root CA certificate may be the base to issue multiple intermediate CA certificates...

Word Count : 5156

Chain of trust

Last Update:

each component of hardware and software from the end entity up to the root certificate. It is intended to ensure that only trusted software and hardware can...

Word Count : 465

Trusted Platform Module

Last Update:

Infineon Root Certificate Intel EK Root Certificate Intel EK Intermediate Certificate NationZ EK Root Certificate NationZ EK Intermediate Certificate NationZ...

Word Count : 6450

Trust anchor

Last Update:

which trust is assumed and not derived. In the X.509 architecture, a root certificate would be the trust anchor from which the whole chain of trust is derived...

Word Count : 162

Java version history

Last Update:

Memory Devices JEP 317: Experimental Java-Based JIT Compiler JEP 319: Root Certificates JEP 322: Time-Based Release Versioning The first of these JEP 286...

Word Count : 10631

Certificate Transparency

Last Update:

each submitted certificate or precertificate has a valid signature chain leading back to a trusted root certificate authority certificate. Refuse to publish...

Word Count : 1784

Proxy server

Last Update:

being intercepted, one can examine the certificate associated with any secure web site, the root certificate should indicate whether it was issued for...

Word Count : 5416

Public key infrastructure

Last Update:

revoke intermediary certificates issued by a compromised root certificate authority. Cryptographic agility (crypto-agility) Certificate Management Protocol...

Word Count : 4048

Dell

Last Update:

Dell computers had shipped with an identical pre-installed root certificate known as "eDellRoot". This raised such security risks as attackers impersonating...

Word Count : 15340

HTTP Public Key Pinning

Last Update:

pair to get a certificate from any certificate authority, when one has access to the private key. Also the user can pin public keys of root or intermediate...

Word Count : 1259

Web of trust

Last Update:

way up to a 'self-signed' root certificate. Root certificates must be available to those who use a lower-level CA certificate and so are typically distributed...

Word Count : 3392

Potentially unwanted program

Last Update:

without their informed consent. Some unwanted software bundles install a root certificate on a user's device, which allows hackers to intercept private data...

Word Count : 2130

Certification path validation algorithm

Last Update:

Subject certificate and proceeds through a number of intermediate certificates up to a trusted root certificate, typically issued by a trusted certificate authority...

Word Count : 574

Internet in Kazakhstan

Last Update:

an attack would involve requiring all Internet users to install a root certificate controlled by the Kazakh government into all their devices, allowing...

Word Count : 3812

DigiNotar

Last Update:

certificate authority, issuing two types of certificate. First, they issued certificates under their own name (where the root CA was "DigiNotar Root CA")...

Word Count : 3207

GeoTrust

Last Update:

issuing all Certificates under the DigiCert Trusted Root TLS Certificate. Liana B. Baker (2017-08-02). "Symantec to sell Web certificates business to...

Word Count : 668

Onavo

Last Update:

including Applause and BetaBound, and requires users to install a Facebook root certificate on their phone. On iOS, this is prohibited by Apple's Enterprise Developer...

Word Count : 2446

Hongkong Post

Last Update:

world. Since 2000, Hongkong Post is a recognized root certificate authority and issues digital certificates under the trade name "e-Cert". Hongkong Post also...

Word Count : 1730

Key ceremony

Last Update:

SAS 70 standard for root key ceremonies. At the heart of every certificate authority (CA) is at least one root key or root certificate and usually at least...

Word Count : 1505

Thawte

Last Update:

issuance of certificates and a dispute with Google, the GeoTrust Root Certificate became untrusted. This led to the sale of Symantec's certificate business...

Word Count : 1121

Transport Layer Security

Last Update:

superfish adware on some Lenovo notebooks, a researcher found a trusted root certificate on affected Lenovo machines to be insecure, as the keys could easily...

Word Count : 17117

PDF Search Engine © AllGlobal.net