SlideShare a Scribd company logo
1 of 12
Protocols for public-key
management
Key management –two problems
• Distribution of public keys (for public-key
cryptography)
• Distribution of secret keys (for classical
cryptography)
• This has more to do with authentication of the
users
Management of public keys
• One problem we went over too quickly: if Alice and Bob do not know
each other, how do they get each other’s public key to communicate
with each other?
• Solution 1: append your public key (e.g., for PGP) to the end of your
email
– Attack: emails can be forged –Eve sends an email to Bob pretending
she is Alice and handing him a public key, supposedly Alice’s; she will
be able to communicate with Bob pretending she is Alice
• Solution 2: post it on your website
– Attack: Eve breaks into the DNS server and sends Alice a fake
webpage purportedly of Bob’s
– Alice encrypts the message using that public key and Eve will be able to
read it; Eve may even modify the message and forwards it to Bob using
his public key
First solution: Public-key Authority
Bottom-line idea here: get the public key of the other user from a trusted central authority
• This scenario assumes the existence of a public authority (whoever that may be) that
maintains a dynamic directory of public keys of all users
– The public authority has its own (private key, public key) that it is using to communicate to
users
• Whenever Alice want to communicate with Bob she will go through the following
protocol:
– 1.Alice sends a time stamped message to the central authority with a request for Bob’s
public key (the time stamp is to mark the moment of the request)
– 2.The authority sends back a message encrypted with its private key (for authentication) –
message contains Bob’s public key and the original message of Alice –this way Alice knows
this is not a reply to an old request;
– 3.Alice starts the communication to Bob by sending him an encrypted message containing
her name and a random number (to identify uniquely this transaction)
– 4.Bob gets Alice’s public key in the same way (step 1)
– 5.Bob gets Alice’s public key in the same way (step 2)
– 6.Bob replies to Alice by sending an encrypted message with Alice’s random number plus
another random number (to identify uniquely the transaction)
– 7.Alice replies once more encrypting Bob’s random number
• Steps 6,7 are desirable so that Alice and Bob authenticate each other –indeed they
are the only ones who could read each other’s random number
First solution: Public-key Authority
Drawbacks to the first solution
• For any communication between any two users,
the central authority must be consulted by both
users to get the newest public keys
• The central authority must be online 24
hours/day
• If the central authority goes offline, all secure
communications halt
• This clearly leads to an undesirable bottleneck
Second solution: Certificate
Authority
• Idea: have a trusted authority to certify one’s own public key
– Whenever Alice want to start secure communication with Bob she sends him her
public key certified by the central authority (encrypted with its private key) –
Bob will know that it is indeed Alice because he will see her name in the
certificate (he can decrypt it using the authority’s public certificate)
– To get her own certificate she must visit the authority (with her passport) or
otherwise use some type of e-security –after that she may place it on the web
because it is un forgeable
– The certificate can be used for a period of time after which it must be changed –
think of it as a credit card with an expiration date
– The central authority does not have to be online all the time –it may not be online
at all
• The main job of the certification authority is to bind a public key to someone’s identity
– Note however that the name of the user need not be in the certificate
– Instead the certificate may only state that the user is over 18 years old or has
some other kind of rights –this may be useful for anonymity
• When Alice has her private key compromised she is in the same position as losing
her credit card: she must go to the authority and get a new certificate; same after
expiration time of her certificate
Certificate Authority (CA)
A standard for certificates: X.509
• To avoid having different types of certificates for different
users standard X.509 has been issued for the format of
certificates –widely used over the Internet
• At its core, X.509 is a way to describe certificates (see
the table on the next slide) –for detailed information see
the standard or RFC 2459
• Example: if Bob works in the loan department of the
Money Bank in the US, his X.500 (a series of
recommendations) address could be/C=US/O=Money
Bank/OU=Loan/CN=Bob, where C is for country, O for
organization, OU for organizational unit, CN for common
name
A standard for certificates: X.509
Public key infrastructures (PKI)
• One single CA issuing all the world’s certificates is clearly infeasible
• Several CAs all run by the same organization (which one?) using
the same private key to issue certificates introduces the real
problem of key leakage –this would ruin the whole world’s e-security
• Proposed solution (still to be standardized): Public Key
Infrastructure (PKI)
– Has multiple components, including users, CAs, certificates, directories
– Give here just a simple form of PKI as a hierarchy of Cas
– In our example we show only three levels, but in practice there could
many more
– On the top of the hierarchy is the top-level CA (the root)
– The root certifies second-level CAs that we call RAs (Regional
Authorities)
– RAs certify the real CAs which issue X.509 certificates to individuals
and institutions
Public key infrastructures

More Related Content

Similar to Network security.ppt

5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communicationsdefconmoscow
 
Chapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksAndy Juan Sarango Veliz
 
Crypto-Book Hotnets
Crypto-Book HotnetsCrypto-Book Hotnets
Crypto-Book Hotnetsmahan9
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, WorteksParis Open Source Summit
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for DummiesWorteks
 
AOL - Concordia use cases
AOL - Concordia use casesAOL - Concordia use cases
AOL - Concordia use casesGeorge Fletcher
 
Network Security
Network SecurityNetwork Security
Network Securityhj43us
 
authentication and types of authentication .ppt
authentication and types of authentication .pptauthentication and types of authentication .ppt
authentication and types of authentication .pptShahidaRazzaq2
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.pptjayarao21
 
Crypto-Book: Document leakage
Crypto-Book: Document leakageCrypto-Book: Document leakage
Crypto-Book: Document leakagemahan9
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
20 security
20 security20 security
20 securityabiy2004
 

Similar to Network security.ppt (20)

Blockchain meetup
Blockchain meetupBlockchain meetup
Blockchain meetup
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communications
 
Chapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer Networks
 
Crypto-Book Hotnets
Crypto-Book HotnetsCrypto-Book Hotnets
Crypto-Book Hotnets
 
Black opspki 2
Black opspki 2Black opspki 2
Black opspki 2
 
Chapter 7 security
Chapter 7 securityChapter 7 security
Chapter 7 security
 
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
#OSSPARIS19 - TLS for dummies - MAXIME BESSON, Worteks
 
[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies[POSS 2019] TLS for Dummies
[POSS 2019] TLS for Dummies
 
AOL - Concordia use cases
AOL - Concordia use casesAOL - Concordia use cases
AOL - Concordia use cases
 
Network Security
Network SecurityNetwork Security
Network Security
 
authentication and types of authentication .ppt
authentication and types of authentication .pptauthentication and types of authentication .ppt
authentication and types of authentication .ppt
 
authentication.ppt
authentication.pptauthentication.ppt
authentication.ppt
 
Dmk bo2 k8_ccc
Dmk bo2 k8_cccDmk bo2 k8_ccc
Dmk bo2 k8_ccc
 
Crypto-Book: Document leakage
Crypto-Book: Document leakageCrypto-Book: Document leakage
Crypto-Book: Document leakage
 
Trusted intermediaries
Trusted intermediariesTrusted intermediaries
Trusted intermediaries
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
20 security
20 security20 security
20 security
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
 
SSL/TLS 101
SSL/TLS 101SSL/TLS 101
SSL/TLS 101
 

More from ChSheraz3

Servers.pptx
Servers.pptxServers.pptx
Servers.pptxChSheraz3
 
Linux Servers.pptx
Linux Servers.pptxLinux Servers.pptx
Linux Servers.pptxChSheraz3
 
RAID & It’s Levels.pptx
RAID & It’s Levels.pptxRAID & It’s Levels.pptx
RAID & It’s Levels.pptxChSheraz3
 
Organizations and Team Structure
Organizations and Team StructureOrganizations and Team Structure
Organizations and Team StructureChSheraz3
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.pptChSheraz3
 

More from ChSheraz3 (7)

NS 2.pptx
NS 2.pptxNS 2.pptx
NS 2.pptx
 
MISch04
MISch04MISch04
MISch04
 
Servers.pptx
Servers.pptxServers.pptx
Servers.pptx
 
Linux Servers.pptx
Linux Servers.pptxLinux Servers.pptx
Linux Servers.pptx
 
RAID & It’s Levels.pptx
RAID & It’s Levels.pptxRAID & It’s Levels.pptx
RAID & It’s Levels.pptx
 
Organizations and Team Structure
Organizations and Team StructureOrganizations and Team Structure
Organizations and Team Structure
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
 

Recently uploaded

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Network security.ppt

  • 2. Key management –two problems • Distribution of public keys (for public-key cryptography) • Distribution of secret keys (for classical cryptography) • This has more to do with authentication of the users
  • 3. Management of public keys • One problem we went over too quickly: if Alice and Bob do not know each other, how do they get each other’s public key to communicate with each other? • Solution 1: append your public key (e.g., for PGP) to the end of your email – Attack: emails can be forged –Eve sends an email to Bob pretending she is Alice and handing him a public key, supposedly Alice’s; she will be able to communicate with Bob pretending she is Alice • Solution 2: post it on your website – Attack: Eve breaks into the DNS server and sends Alice a fake webpage purportedly of Bob’s – Alice encrypts the message using that public key and Eve will be able to read it; Eve may even modify the message and forwards it to Bob using his public key
  • 4. First solution: Public-key Authority Bottom-line idea here: get the public key of the other user from a trusted central authority • This scenario assumes the existence of a public authority (whoever that may be) that maintains a dynamic directory of public keys of all users – The public authority has its own (private key, public key) that it is using to communicate to users • Whenever Alice want to communicate with Bob she will go through the following protocol: – 1.Alice sends a time stamped message to the central authority with a request for Bob’s public key (the time stamp is to mark the moment of the request) – 2.The authority sends back a message encrypted with its private key (for authentication) – message contains Bob’s public key and the original message of Alice –this way Alice knows this is not a reply to an old request; – 3.Alice starts the communication to Bob by sending him an encrypted message containing her name and a random number (to identify uniquely this transaction) – 4.Bob gets Alice’s public key in the same way (step 1) – 5.Bob gets Alice’s public key in the same way (step 2) – 6.Bob replies to Alice by sending an encrypted message with Alice’s random number plus another random number (to identify uniquely the transaction) – 7.Alice replies once more encrypting Bob’s random number • Steps 6,7 are desirable so that Alice and Bob authenticate each other –indeed they are the only ones who could read each other’s random number
  • 6. Drawbacks to the first solution • For any communication between any two users, the central authority must be consulted by both users to get the newest public keys • The central authority must be online 24 hours/day • If the central authority goes offline, all secure communications halt • This clearly leads to an undesirable bottleneck
  • 7. Second solution: Certificate Authority • Idea: have a trusted authority to certify one’s own public key – Whenever Alice want to start secure communication with Bob she sends him her public key certified by the central authority (encrypted with its private key) – Bob will know that it is indeed Alice because he will see her name in the certificate (he can decrypt it using the authority’s public certificate) – To get her own certificate she must visit the authority (with her passport) or otherwise use some type of e-security –after that she may place it on the web because it is un forgeable – The certificate can be used for a period of time after which it must be changed – think of it as a credit card with an expiration date – The central authority does not have to be online all the time –it may not be online at all • The main job of the certification authority is to bind a public key to someone’s identity – Note however that the name of the user need not be in the certificate – Instead the certificate may only state that the user is over 18 years old or has some other kind of rights –this may be useful for anonymity • When Alice has her private key compromised she is in the same position as losing her credit card: she must go to the authority and get a new certificate; same after expiration time of her certificate
  • 9. A standard for certificates: X.509 • To avoid having different types of certificates for different users standard X.509 has been issued for the format of certificates –widely used over the Internet • At its core, X.509 is a way to describe certificates (see the table on the next slide) –for detailed information see the standard or RFC 2459 • Example: if Bob works in the loan department of the Money Bank in the US, his X.500 (a series of recommendations) address could be/C=US/O=Money Bank/OU=Loan/CN=Bob, where C is for country, O for organization, OU for organizational unit, CN for common name
  • 10. A standard for certificates: X.509
  • 11. Public key infrastructures (PKI) • One single CA issuing all the world’s certificates is clearly infeasible • Several CAs all run by the same organization (which one?) using the same private key to issue certificates introduces the real problem of key leakage –this would ruin the whole world’s e-security • Proposed solution (still to be standardized): Public Key Infrastructure (PKI) – Has multiple components, including users, CAs, certificates, directories – Give here just a simple form of PKI as a hierarchy of Cas – In our example we show only three levels, but in practice there could many more – On the top of the hierarchy is the top-level CA (the root) – The root certifies second-level CAs that we call RAs (Regional Authorities) – RAs certify the real CAs which issue X.509 certificates to individuals and institutions