From the course: Ethical Hacking: Cryptography

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Fundamentals of public key infrastructure (PKI), continued

Fundamentals of public key infrastructure (PKI), continued

From the course: Ethical Hacking: Cryptography

Fundamentals of public key infrastructure (PKI), continued

- [Instructor] Let's take a deeper look at the Certificate Authority, or CA. It operates as a trusted introducer, which was the role played by Domain 2 in our example earlier. The CA is primarily responsible for issuing, revoking, and distributing digital certificates. A CA is vouching for the certificate's owner's identity in the same way as having a government issued ID or passport verified. There are several trusted third party organizations you might be thinking of who act as CAs. We have GlobalSign, Verisign, Entrust, GoDaddy, and hundreds more out there across the globe who charge a fee, of course, to help you decide who are you going to trust. However, companies can also have in-house CAs, or you can create a self-signed certificate on your own certificate server as well. These are most used in limited self-controlled testing scenarios. As you could imagine, this is a lot of work for CA to do alone. That's why it needs the help of the Registration Authority, or RA. Now the RA…

Contents