Fact-checked by Grok 2 weeks ago

Chain of trust

A chain of trust is a foundational concept in (PKI) that establishes the validity and authenticity of digital through a hierarchical sequence linking an end-entity —such as an SSL/TLS for a —to one or more intermediate and ultimately to a trusted authority (CA). This mechanism ensures secure digital communications by allowing relying parties, like web browsers, to verify that a originates from a legitimate source without direct knowledge of the issuer. The structure of a chain of trust comprises three primary components: the root CA, which issues a serving as the ultimate pre-installed in operating systems and ; intermediate CAs, which are subordinate to the root and issue to further distribute while adding layers of security isolation; and the end-entity , which binds a public to a specific like a or device for practical use in and . Validation occurs when a client, such as a , traces the chain backward: it checks the of each using the public of its issuer, continuing until reaching a trusted root in its local store, with any break in the chain triggering security warnings. This model underpins critical applications in cybersecurity, including securing connections for online transactions, enabling for encrypted email, and verifying software signatures to prevent tampering during distribution. By propagating trust hierarchically, the chain mitigates risks like man-in-the-middle attacks and forgery, though it relies on the integrity of root CAs and proper management to avoid vulnerabilities such as expired intermediates. Effective chain management enhances organizational security.

Fundamentals

Definition and Core Concepts

A chain of trust is a hierarchical sequence of digital certificates in (PKI), where each certificate is digitally signed by a higher-level (CA), forming a certification path that culminates in a trusted known as a . This structure enables transitive trust, wherein if an entity trusts the root certificate, it can extend that trust to all certificates in the chain through successive verifications. PKI provides the broader framework for managing these certificate chains to secure communications and authenticate identities. Core concepts include the , which serves as the foundational element—a self-signed or a public key that is pre-trusted by relying parties, often distributed via trusted software or policy. Intermediate certificates, issued by the or other intermediates, act as subordinate to distribute signing authority without compromising the root's security. End-entity certificates, the final leaf in the chain, bind a public key to an entity such as a , , or for specific uses like . The transitive trust model operates on the principle that trust propagates linearly: if entity A trusts B and B trusts C, then A trusts C, provided each link's signature is valid. Key principles underpinning chains of trust rely on , which uses asymmetric key pairs—public keys for and keys for signing—to ensure secure of identities to keys. Digital signatures, generated by CAs using algorithms such as or ECDSA, provide proof of authenticity and for each in the chain. Hash functions, like SHA-256, play a crucial role by producing a fixed-size digest of the certificate data, which is then signed to verify and detect tampering during validation. In a simple chain example, a root issues and signs an intermediate certificate using its private key; the intermediate then signs an end-user certificate with its own private key. Verification begins at the end-user certificate: its signature is checked against the intermediate 's public key (extracted from the intermediate certificate), which in turn is verified against the root 's public key from the trusted , confirming the entire chain's integrity through successive public key validations.

Historical Development

The concept of a chain of trust in emerged as a foundational mechanism for verifying authenticity and integrity, building on the invention of digital signatures in the 1970s through developed by and in 1976, which enabled secure without prior shared secrets. Early practical implementations of trust models appeared in the late and early 1990s, with Phil Zimmermann's release of (PGP) in 1991 introducing the "" as a decentralized alternative to centralized authorities, where users could mutually sign keys to establish trust networks without relying on a single . This approach contrasted with emerging hierarchical systems and highlighted concerns over centralized control in privacy-focused communications. The standardization of (PKI) in the 1990s formalized chain of trust through the standard, initially published by the (ITU-T) in 1988 as part of the directory services, which defined basic formats for . The standard evolved significantly with version 3 in 1996, incorporating extensions for certificate chains, revocation lists, and attribute certificates, enabling scalable hierarchies of trust from root authorities to end entities. Key milestones in the 1990s and 2000s drove widespread adoption of chain of trust in web security. Communications introduced the Secure Sockets Layer (SSL) protocol in 1994 to secure browser-server communications, relying on certificates in a chain validated back to trusted roots, which later evolved into (TLS) standardized by the IETF in 1999. launched its root certificate program alongside updates, curating a trusted store of root certificates from vetted authorities to simplify chain validation for users. The , formed in 2005 to harmonize certificate issuance practices, released its first Extended Validation Guidelines in 2007 and Baseline Requirements in 2011, establishing minimum standards for chain integrity and reducing risks from inconsistent practices. In the post-2000s era, the chain of trust shifted from ad-hoc self-signed certificates to managed, audited hierarchies, accelerated by high-profile incidents that underscored vulnerabilities. The 2011 breach at , a , allowed attackers to issue fraudulent certificates for domains like google.com, compromising chains trusted by major browsers and leading to the company's bankruptcy while prompting global revocations and stricter oversight of root programs. This event catalyzed reforms, including enhanced auditing and liability frameworks, solidifying the reliance on robust, verifiable chains in modern PKI ecosystems. Subsequent developments further strengthened chain management. In 2015, issues with Symantec's certificate issuance practices led to the revocation of over 100,000 certificates and eventual exclusion from major root programs, emphasizing rigorous validation processes. The continued evolving standards, with Ballot 193 in reducing the maximum validity period for public TLS certificates to 398 days to mitigate risks from long-lived certificates. As of 2025, efforts are underway to integrate into certificate chains, with NIST standardizing algorithms like ML-KEM to prepare for quantum threats.

Technical Mechanisms

Certificate Hierarchies

Certificate hierarchies in (PKI) organize into a layered structure that establishes transitive trust from end-entity to trusted roots. This architecture relies on a chain of digital signatures where each is issued and signed by a higher-level authority, enabling secure verification of identities and keys. The hierarchy typically consists of root authorities (CAs), intermediate CAs, and leaf or end-entity , forming a tree-like model that balances security, , and operational efficiency. Root CAs occupy the top level of the hierarchy and issue self-signed certificates that act as ultimate trust anchors. These root certificates are generated using a private key held offline for security, and their public keys are pre-installed in trust stores of browsers, operating systems, and applications to bootstrap trust. Intermediate CAs, signed by root CAs, operate at the middle levels to distribute the workload of certificate issuance, reducing exposure of the root private key while allowing delegation of authority. Leaf or end-entity certificates, issued by intermediate CAs, are assigned to specific users, devices, or services for purposes such as authentication or encryption, and they do not issue further certificates. Certificate chains are constructed bottom-up, starting from the end-entity and ascending through intermediate certificates to the root , with each subsequent certificate serving as the of the one below it. This path typically spans 2 to 4 levels to optimize manageability and performance while minimizing the risk of compromise propagation. The basicConstraints extension in certificates enforces path length constraints, limiting the number of non-self-issued intermediate CAs allowable in the chain to prevent excessively deep hierarchies. X.509 certificates within these hierarchies include key attributes that define their role and constraints. The subject distinguished name (DN) identifies the entity the certificate is issued to, while the issuer DN specifies the that signed it, ensuring linkage in the chain. Validity periods delineate the notBefore and notAfter times during which the certificate is active, typically ranging from months to years depending on the level. Key usage extensions, such as keyEncipherment for purposes, restrict the certificate's applications, and the CRL distribution points extension provides locations for retrieving revocation lists to check certificate status. Cross-certification occurs in rare scenarios to bridge trust between separate PKI domains, where a CA in one hierarchy issues a certificate to a CA in another, creating an alternate trust path. This mechanism allows entities in disparate infrastructures to validate each other's certificates without merging the entire hierarchies, often using bridge CAs to manage . Such arrangements are uncommon due to the complexity of maintaining mutual trust and are typically employed in federated environments like or alliances.

Validation Processes

The validation of a chain of trust in (PKI) begins with constructing the certification path, which involves collecting s from the end-entity to a trusted root certification authority (CA). This process starts with the end-entity provided by the relying party, such as a during a TLS , and traces upward by matching the subject distinguished name (DN) of each to the issuer DN of the previous one. If intermediate s are missing, the Authority Information Access (AIA) extension in the —specifically the caIssuers access method—supplies uniform resource identifiers (URIs) pointing to the issuer's , enabling automated fetching over protocols like HTTP. Once the chain is built, proceeds through a series of algorithmic steps to ensure the path's integrity and compliance, as outlined in the basic path validation algorithm. First, each certificate's signature is checked for validity using the public key of its issuer, confirming that the certificate's to-be-signed () portion has not been altered. Second, the chain's completeness is confirmed by ensuring it terminates at a trusted root , known as a , whose public key is pre-trusted by the (e.g., via a system's root store). Third, validity dates are validated to ensure the current time falls within each certificate's notBefore and notAfter fields. Fourth, status is assessed using mechanisms such as Certificate Revocation Lists (CRLs) or the (OCSP), querying the issuer's designated responder to verify the certificate has not been revoked. Finally, policy checks are applied, including name constraints that restrict the permitted or excluded subtrees for subject names in subordinate certificates, ensuring the chain adheres to the trust anchor's issuance policies. Cryptographic verification of signatures forms the core of chain trust, relying on asymmetric algorithms like to confirm authenticity. For an certificate, the signature covers the certificate data, which is hashed (e.g., using SHA-256) and then encrypted with the issuer's private key to produce the signature value. Verification decrypts this value using the issuer's public key and compares it to the recomputed hash of the data. In the RSASSA-PKCS1-v1_5 scheme, commonly used in PKI, the process follows these steps:
RSASSA-PKCS1-v1_5-VERIFY((n, e), M, S)

1. If the length of S is not k octets, output "invalid [signature](/page/Signature)".

2. Let s = OS2IP (S).  (See Note 1.)

3. Let m = RSAVP1 ((n, e), s).  (See Note 2.)

4. Let EM = I2OSP (m, k).  (See Note 3.)

5. Let EM' = EMSA-PKCS1-v1_5-ENCODE (M, k).  (See Note 4.)

6. If EM = EM', output "valid [signature](/page/Signature)". Otherwise, output "invalid [signature](/page/Signature)".

Note 1: OS2IP means conversion from octet [string](/page/String) to [integer](/page/Integer).

Note 2: RSAVP1 computes m = s^e mod n; if m >= 2^k, output "signature representative out of range".

Note 3: I2OSP converts integer to octet string of length k.

Note 4: EMSA-PKCS1-v1_5-ENCODE applies padding and hash to M.
This pseudocode ensures the signature matches the certificate content, with the public key (n, e) derived from the issuer certificate in the chain. If any verification step fails, the chain is considered invalid, leading to rejection of the end-entity certificate; for instance, an untrusted root CA results in a complete validation failure, as the path cannot anchor to a known trust point. In web browsers, partial chains—where intermediates are omitted by the server—are often handled by attempting to fetch missing certificates via AIA URIs before failing, though success depends on the implementation (e.g., Chrome fetches via HTTP, while Firefox may not due to NSS limitations, prompting user warnings for untrusted connections). Such errors typically trigger security alerts, allowing user override in non-critical scenarios but enforcing failure in strict modes.

Applications in Security

Public Key Infrastructure

Public Key Infrastructure (PKI) relies on chains of trust to establish secure communications over networks, particularly in protocols like (TLS) and Secure Sockets Layer (SSL). In a typical , the server presents its certificate chain, which the client validates by tracing it back to a trusted authority () stored in its database. This process ensures the server's and enables encrypted sessions, preventing man-in-the-middle attacks by confirming the chain's through signature verification at each level. For instance, Mozilla's Network Security Services (NSS) library, used in , maintains a root store that clients use to anchor this validation during the handshake. In web applications, HTTPS leverages these certificate chains for domain authentication, categorized by validation levels defined by the . Domain Validated (DV) certificates confirm only domain control via automated methods like DNS records or HTTP challenges, suitable for basic site security. Organization Validated (OV) certificates extend this by verifying the legal entity's identity and address using official records, providing moderate assurance for business sites. Extended Validation () certificates demand the highest scrutiny, including on-site s and annual compliance reviews by qualified auditors under standards like WebTrust, to affirm the organization's operational legitimacy and reduce risks. EV chains thus incorporate stricter policy identifiers and audit proofs, displayed prominently in browsers to signal enhanced trust. Recent updates by the , effective in phases starting March 15, 2026, reduce the maximum validity period for public TLS certificates to 47 days by March 15, 2029, to strengthen security in chain of trust applications. Trust stores, managed by operating system and browser vendors, serve as the repositories for root certificates that anchor PKI chains. The Windows Certificate Store, part of the operating system, holds trusted root CAs in its "Trusted Root Certification Authorities" container, updated periodically via updates to reflect program policies. Similarly, Java applications use a keystore or truststore file, often configured via the keytool utility, to load root anchors for SSL/TLS validation in enterprise environments. Mozilla's NSS maintains an independent root program, curating inclusions based on security audits and transparency requirements. Apple has updated its Root Certificate Program to impose stricter limits on new root inclusions per CA provider, emphasizing reduced proliferation of roots to enhance ecosystem security and manage trust store bloat. For international interoperability, PKI chains must align with regional regulations, such as the European Union's framework effective since July 2016. The EU Trusted Lists (TLs), published by member states and aggregated in a List of Trusted Lists (LOTL), catalog qualified trust service providers—including —and their s, enabling cross-border validation of chains for electronic signatures and seals. This ensures that a issued in one EU country is recognized in others by verifying against the TL's pointers to root and intermediate , facilitating compliant secure communications without bilateral agreements. Clients can access these lists via the European Commission's TL Browser to build or extend trust in international chains.

Software and Code Signing

In software and code signing, developers establish a chain of trust by obtaining digital certificates from trusted certificate authorities (CAs) to authenticate the origin and integrity of executables, scripts, and other binaries. The process begins with the developer generating a public-private key pair and submitting a certificate signing request (CSR) to a CA, which verifies the developer's identity before issuing an end-entity certificate bound to the public key. This certificate is used to sign the software artifact, typically embedding a digital signature within formats like Authenticode for Windows executables, where the private key creates a hash-based signature verifiable against the public key in the certificate chain. The chain extends upward through intermediate CAs to a trusted root CA, such as those operated by DigiCert (formerly VeriSign) or Sectigo, ensuring traceability to a pre-trusted anchor in the operating system's certificate store. For instance, Microsoft Authenticode relies on this hierarchy to sign Windows applications, drivers, and kernel-mode code, enabling verification of the publisher's identity and detection of tampering, with enforcement of signing requirements for components like drivers and kernel-mode code to block unsigned or altered binaries. Operating systems verify these chains during software installation or execution to enforce trust boundaries. In Windows, SmartScreen evaluates the by traversing the certificate chain to a Microsoft-trusted , confirming the publisher's identity and checking for tampering via validation; if the chain is intact and the publisher has a positive reputation, the software bypasses warnings. Similarly, macOS assesses code signatures against Apple's authority, requiring a valid Developer ID certificate chain that proves the originates from an Apple-vetted developer and remains unmodified. On Android, Google Play App Signing integrates the developer's into a chain anchored by Google's , where the platform verifies the app bundle's signature during or updates to ensure and . To address certificate expiration and maintain long-term validity, code signing incorporates timestamping protocols that embed a trusted time marker from a Time Stamping Authority (TSA). Defined in RFC 3161, this process involves the signer requesting a timestamp token—a signed assertion of the signing time and hash—before applying the signature, allowing verifiers to confirm the software was signed during the certificate's validity period even if the certificate later expires. TSAs, often operated by CAs like , use their own certificate chains to countersign the token, extending the chain of trust to include temporal proof without requiring re-signing. This mechanism is integral to Authenticode and similar standards, ensuring perpetual verifiability for archived or distributed software. In mobile and update scenarios, chains of trust secure over-the-air () distributions and deployments. For , OTA updates leverage Apple's hardware of trust, where images are signed with certificates chaining to Apple's CA, verified by the device's secure enclave to prevent unauthorized modifications during installation. In devices, custom hierarchies are common, with manufacturers establishing proprietary CAs or leveraging cloud-based services to sign ; each boot stage validates the next via embedded public keys, forming a device-specific chain that culminates in a hardware-anchored for resilience against supply-chain attacks. These approaches ensure that only authenticated updates propagate, preserving system integrity in constrained environments.

Challenges and Vulnerabilities

Common Attacks

One of the most severe threats to a chain of trust is the compromise of a authority (), which can invalidate the entire hierarchy of certificates issued under it. In the 2011 hack, intruders breached the CA's systems, generating over 500 fraudulent certificates for high-profile domains like and , enabling man-in-the-middle attacks primarily targeting Iranian users. This incident led to DigiNotar's bankruptcy and the revocation of its root certificates by major browsers, exposing the fragility of root-level trust. Similarly, in 2015, mis-issued extended validation certificates for domains it did not control, including , due to inadequate validation processes, prompting Google to distrust Symantec-issued certificates and requiring widespread reissuance. Attacks on intermediate CAs can also propagate distrust downward through the chain. The 2011 Comodo incident involved a compromised partner, resulting in nine rogue certificates for sites like , , and , issued without proper domain control verification. Attackers exploited stolen credentials to request these certificates, highlighting vulnerabilities in delegated issuance processes and leading to immediate revocations by browser vendors. Supply chain compromises can undermine the chain of trust in PKI-based software integrity verification by inserting into legitimately signed updates. The 2020 exemplifies this, where Russian state actors inserted into the software's update mechanism, compromising trust in the for thousands of organizations, including U.S. agencies, and allowing persistent access. This compromise eroded trust in signed updates, affecting up to 18,000 victims. Revocation evasion exploits delays or failures in certificate revocation mechanisms, such as Certificate Revocation Lists (CRLs) or (OCSP) responses, allowing malicious certificates to remain active. Recent analyses of Web PKI practices indicate that approximately 7% of revoked certificates continue to be observed in use post-revocation, often due to incomplete client checks or propagation lags in CRL/OCSP updates. These delays can extend to hours or days, enabling attackers to maintain access before relying parties detect and act on revocations.

Mitigation Strategies

Protecting the root of a chain of trust is paramount to preventing widespread compromises, as the root certificate authority (CA) private key underpins the entire hierarchy. Hardware Security Modules (HSMs) are widely mandated for storing root private keys, providing tamper-resistant environments that meet or exceed Level 3 validation standards to safeguard against unauthorized access and extraction. Multi-party computation (MPC) techniques, such as threshold signatures, distribute the signing process across multiple entities, ensuring that no single party holds the full root key and requiring a for any generation, thereby enhancing resilience against insider threats or single-point failures in CA operations. Additionally, regular audits conducted by qualified third-party auditors under CA/B Forum guidelines, including annual WebTrust or ETSI-compliant reviews, verify compliance with practices and detect potential weaknesses in root operations. Enhancing revocation mechanisms addresses delays in detecting and responding to compromised certificates within the chain. , defined in the TLS extensions framework, allows servers to include a signed OCSP response from the CA during the TLS handshake, reducing client-side latency and privacy risks associated with direct OCSP queries while ensuring timely revocation status checks. (CT) logs, introduced in , provide an public of all issued certificates, enabling external monitoring and detection of unauthorized issuances through real-time auditing by relying parties and the community. Shortening certificate chains minimizes the by reducing the number of intermediates that could be targeted. Best practices encourage two-level hierarchies—consisting of a root and a single subordinate CA—to limit propagation risks, as implemented by services like , which automate issuance and renewal of short-lived end-entity certificates with 90-day validity periods to expedite revocation and decrease exposure windows. In April 2025, the CA/B Forum approved a phased reduction in maximum TLS certificate validity periods—to 200 days by March 2026, 100 days by March 2027, and 47 days by March 2029—further mitigating risks from compromised certificates by shortening their usable lifespan. Emerging standards focus on future-proofing chains against evolving threats, including . Preparations for involve hybrid schemes that combine classical algorithms like ECDH with NIST-standardized post-quantum key encapsulation mechanisms (e.g., ML-KEM from FIPS 203, published in ), allowing gradual integration into PKI without disrupting existing models. Zero-trust architectures further reduce reliance on long-lived chains by enforcing continuous and short-lived credentials, shifting from static anchors to dynamic, policy-based controls that validate each independently.

References

  1. [1]
    The Chain of Trust: What it is, Key Concepts and Applications
    Aug 8, 2024 · The chain of trust is a series of certificates that starts with a highly trusted root certificate, moves through intermediate certificates, and ...What is the Chain of Trust? · How does the chain of trust...
  2. [2]
    What is the Certificate Chain of Trust? - Keyfactor
    Sep 2, 2020 · The chain of trust certification aims to prove that a particular certificate originates from a trusted source.
  3. [3]
    Certificate Chain of Trust | CyberArk
    The term “chain of trust” in the context of TLS/SSL certificates refers to the connection of your certificate to a trusted Certificate Authority (CA). For a TLS ...
  4. [4]
    RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and ...
    RFC 5280 profiles X.509 v3 certificates and X.509 v2 CRLs for the Internet, part of the Internet PKI standards, and describes certification path processing.
  5. [5]
  6. [6]
  7. [7]
    trust anchor - Glossary | CSRC
    A CA with one or more trusted certificates containing public keys that exist at the base of a tree of trust or as the strongest link in a chain of trust.
  8. [8]
  9. [9]
  10. [10]
    RFC 4158 - Internet X.509 Public Key Infrastructure - IETF Datatracker
    Certification path processing establishes a chain of trust between a trust anchor and a certificate. This chain of trust is composed of a series of Cooper, et ...
  11. [11]
    RFC 3279 - Algorithms and Identifiers for the Internet X.509 Public ...
    This document specifies algorithm identifiers and ASN.1 encoding formats for digital signatures and subject public keys used in the Internet X.509 Public Key ...
  12. [12]
    History of Digital Signature: Evolution and Future Prospects
    1976: Whitfield Diffie and Martin Hellman laid the theoretical foundations for digital signatures, developing the Diffie-Hellman key exchange protocol.
  13. [13]
    [PDF] An Introduction to Cryptography - Stony Brook Computer Science
    This chapter contains introductory and background information about cryptography and PGP as written by Phil Zimmermann. Why I wrote PGP. “Whatever you do ...
  14. [14]
    PGP User's Guide, Volume I: Essential Topics
    Philip Zimmermann is a software engineer consultant with 19 years experience, specializing in embedded real-time systems, cryptography, authentication, and ...
  15. [15]
    [PDF] History of X.509 - ITU
    Edition 1 (1988) of X.509. • This first edition defines two methods of authentication: • Simple authentication with directory distinguished name and password ...Missing: 1996 | Show results with:1996
  16. [16]
    TLS Security 2: A Brief History of SSL/TLS - Acunetix
    Mar 31, 2019 · The Secure Sockets Layer (SSL) protocol was first introduced by Netscape in 1994. The Internet was growing and there was a need for ...
  17. [17]
    SSL/TLS and PKI History - Feisty Duck
    Key events include Netscape's SSL v2 (1994), Microsoft's PCT (1995), SSL v3 (1995), TLS v1.0 (1999), and the BEAST attack (2011).
  18. [18]
    About the CA/Browser Forum
    The CA/Browser Forum is governed by Bylaws, which were first adopted in 2012. The Bylaws set forth the qualifications for Membership in the Forum, ...Members · Forum Minutes · Forum IPR Subcommittee · Face-to-Face Minutes
  19. [19]
    How the 2011 hack of DigiNotar changed the internet's infrastructure.
    Dec 21, 2016 · But DigiNotar's case has had long-lasting impacts, motivating some much needed improvements in the security of our online trust infrastructure, ...
  20. [20]
    (PDF) Black Tulip Report of the investigation into the DigiNotar ...
    ... 2011 DigiNotar suffered a breach, which resulted in rogue. certificates being issued that were subsequently abused in a large scale attack in August of 2011.
  21. [21]
    Design a CA hierarchy - AWS Private Certificate Authority
    You can create a hierarchy of certificate authorities with up to five levels. The root CA, at the top of a hierarchy tree, can have any number of branches.
  22. [22]
    Intermediate vs Root Certificates | Sectigo® Official
    Jun 25, 2024 · Root certificates are at the top of the hierarchy, self-signed, and pre-installed. Intermediate certificates sit between root and end-entity, ...
  23. [23]
    Public Key Infrastructure 101 - IDManagement.gov
    A trust store is a list of root, intermediate, and sometimes user certificates that the operating system or application trusts to process transactions. For more ...Missing: hierarchy | Show results with:hierarchy
  24. [24]
    An Intro to X.509 certificates, TLS, and mTLS - Corsha
    Oct 16, 2024 · Intermediate Certificate Authorities (Intermediate CAs): Intermediate CAs are subordinate to root CAs and are used to create a chain of trust.
  25. [25]
  26. [26]
    Basic Constraints certificate extension - PKI Solutions
    Aug 12, 2019 · Note that path length constraint indicates the depth of certificate chain. With value of '1' in path length constraint, you can have unlimited ...
  27. [27]
  28. [28]
  29. [29]
  30. [30]
    Cross Certification - Win32 apps - Microsoft Learn
    Jan 7, 2021 · Cross certification enables entities in one public key infrastructure (PKI) to trust entities in another PKI. This mutual trust relationship ...
  31. [31]
  32. [32]
  33. [33]
  34. [34]
  35. [35]
  36. [36]
  37. [37]
    draft-wilson-wpkops-browser-processing-01 - Browser processing of ...
    ... AIA to obtain the intermediate certificate and construct a chain. Because NSS does not process the caIssuers AIA, Mozilla Firefox is unable to construct a chain ...
  38. [38]
    Mozilla's CA Certificate Program
    Mozilla's CA Certificate Program governs inclusion of root certificates in Network Security Services (NSS), a set of open source libraries designed to support ...CA/Changing Trust Settings · CA/Included Certificates · CA/Application ProcessMissing: Windows Java keystore
  39. [39]
    Trusted Root Certification Authorities Certificate Store - Microsoft Learn
    The Trusted Root Certification Authorities certificate store contains the root certificates of all CAs that Windows trusts. To access the Trusted Root ...Missing: anchors | Show results with:anchors
  40. [40]
    Apple Root Certificate Program
    Aug 15, 2023 · CA providers must strictly limit the number of Root CA Certificates per CA provider, especially those capable of issuing multiple types of ...Missing: 2019 new roots
  41. [41]
    List of qualified trust service providers in the EU
    Article 22 of the eIDAS Regulation obliges EU countries to establish, maintain and publish trusted lists. These lists should include information related to the ...
  42. [42]
    EU/EEA Trusted List Browser - eIDAS Dashboard - European Union
    The European Commission, through the DIGITAL program, provides this tool for anyone to browse the national trusted lists and the LOTL. Search in trusted lists.
  43. [43]
    [PDF] Security Considerations for Code Signing
    Jan 26, 2018 · ... code signing solution to protect the software supply chain. Code signing provides assurance that the software is authentic and has not been ...
  44. [44]
    Authenticode Digital Signatures - Windows drivers - Microsoft Learn
    Jul 11, 2025 · Authenticode is a Microsoft code-signing technology that identifies the publisher and verifies software integrity using digital signatures and ...
  45. [45]
    Certificate Authority Hierarchy: How It Works | Sectigo® Official
    Aug 15, 2023 · The CA hierarchy is like a tree: root CAs issue to intermediate CAs, who then issue to end entities. Root CAs are like the US government.
  46. [46]
    Microsoft Defender SmartScreen overview
    Apr 15, 2025 · Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files.
  47. [47]
    App code signing process in macOS - Apple Support
    Feb 18, 2021 · Code signing is performed by the developer using their Developer ID certificate (issued by Apple). Verification of this signature proves to the ...
  48. [48]
    App signing | Android Open Source Project
    Oct 9, 2025 · On Google Play, app signing bridges the trust Google has with the developer and the trust the developer has with their app. Developers know ...APK signature scheme v2 · APK signature scheme v3 · APK signature scheme v4Missing: chain | Show results with:chain
  49. [49]
    RFC 3161 Time-Stamp Protocol (TSP) - IETF
    The time-stamp token MUST NOT contain any signatures other than the signature of the TSA. The certificate identifier (ESSCertID) of the TSA certificate MUST be ...
  50. [50]
    RFC3161 compliant Time Stamp Authority (TSA) server
    Jun 26, 2025 · DigiCert offers a RFC 3161 timestamp server; therefore, it is now possible to sign files with Microsoft Authenticode RFC3161 compliant timestamping server.
  51. [51]
    Time Stamping Authenticode Signatures - Win32 apps
    Jan 26, 2022 · Authenticode time stamping is based on standard PKCS #7 countersignatures. Signing tools from Microsoft allow developers to affix time stamps at the same time.
  52. [52]
    Security practices for Azure IoT device manufacturers - Microsoft Learn
    Jan 10, 2025 · This article summarizes recommended security practices to consider when you manufacture devices for use with Azure IoT Device Provisioning Service (DPS).
  53. [53]
    Understanding the Role of Secure Code Signing for IoT Firmware
    This process creates a hardware-rooted chain of trust that begins with immutable boot ROM code and extends through all firmware components required for device ...Missing: custom hierarchies
  54. [54]
    [PDF] Operation Black Tulip: Certificate authorities lose authority - ENISA
    DigiNotar, a digital certificate authority (CA), recently suffered a cyber-attack which led to its bankruptcy. In the attack false certificates were created for ...
  55. [55]
    DigiNotar Files for Bankruptcy in Wake of Devastating Hack - WIRED
    Sep 20, 2011 · The breach allowed the intruder to trick DigiNotar's system into issuing him more than 500 fraudulent digital certificates for top internet ...
  56. [56]
    A Post Mortem on the Iranian DigiNotar Attack
    Sep 13, 2011 · The DigiNotar Certificate Authority, which appears to have enabled Iranian hackers to launch successful man-in-the-middle attacks against hundreds of thousands ...
  57. [57]
    Symantec Issues Rogue EV Certificate for Google.com
    Sep 21, 2015 · This alerting will help a site owner quickly detect certain types of misissuance and get any misissued certificates revoked. In Chrome, CT is ...
  58. [58]
    Google takes Symantec to the woodshed for mis-issuing 30,000 ...
    Mar 24, 2017 · In January, an independent security researcher unearthed evidence that Symantec improperly issued 108 new certificates. Thursday's announcement ...
  59. [59]
    Comodo Certificate Issue - Follow Up - Mozilla Security Blog
    Mar 25, 2011 · On 15th March 2011, a RA partner of the Comodo CA suffered an internal security breach (Comodo incident report). The attacker used the RA's ...Missing: rogue | Show results with:rogue
  60. [60]
    Hack Obtains 9 Bogus Certificates for Prominent Websites - WIRED
    Mar 23, 2011 · Out of the nine fraudulent certificates the hacker requested, only one -- for Yahoo -- was found to be active. Abdulhayoglu said Comodo tracked ...Missing: rogue | Show results with:rogue
  61. [61]
    Iranian hackers obtain fraudulent HTTPS certificates: How close to a ...
    Mar 23, 2011 · Comodo has now published a statement about the improperly issued certs, which were for extremely high-value domains including google.com, login.Missing: rogue | Show results with:rogue
  62. [62]
    Advanced Persistent Threat Compromise of Government Agencies ...
    Apr 15, 2021 · The threat actor has been observed leveraging a software supply chain compromise of SolarWinds Orion products[2 ] (see Appendix A). The ...
  63. [63]
    SolarWinds Supply Chain Attack Uses SUNBURST Backdoor
    FireEye discovered a supply chain attack trojanizing SolarWinds Orion business software updates in order to distribute malware we call SUNBURST.
  64. [64]
    SolarWinds Compromise, Campaign C0024 - MITRE ATT&CK®
    Mar 24, 2023 · The SolarWinds Compromise was a sophisticated supply chain cyber operation conducted by APT29 that was discovered in mid-December 2020.
  65. [65]
    [PDF] Trust Issue(r)s: Certificate Revocation and Replacement Practices in ...
    Mar 9, 2024 · Our statistical analysis reveals significant variations in revocation rates, retention rates, and post-revocation usage, shedding light on ...<|separator|>
  66. [66]
    What's going on with certificate revocation? - APNIC Blog
    Mar 22, 2022 · It's faster than performing a full CRL retrieval and lookup. ❌ There's still an additional imposed delay to perform the OCSP query and response.
  67. [67]
  68. [68]
    [1706.03370] Decentralized Certificate Authorities - arXiv
    Jun 11, 2017 · We propose splitting a CA's private key among multiple parties, and producing signatures using a generic secure multi-party computation protocol ...
  69. [69]
    RFC 6962 - Certificate Transparency - IETF Datatracker
    This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or ...
  70. [70]
  71. [71]
    NIST Releases First 3 Finalized Post-Quantum Encryption Standards
    Aug 13, 2024 · NIST plans to announce its selection of one or two of these algorithms by the end of 2024. The second set includes a larger group of ...Missing: hybrid | Show results with:hybrid
  72. [72]
    [PDF] Zero Trust Architecture - NIST Technical Series Publications
    Zero trust focuses on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer.