Delegation and Certificate Chains

Video Notes

RedHat provides an extensive explanation of certificates, what they are, and how they authenticate web sites, servers, clients, or people.

The Linux Documentation Project provides a “how to” about SSL certificates.

Durumeric, Kasten, Bailey, and Halderman presented 2013 results of a large-scale analysis of certificates actively used by SSL/TLS sites.

The Comodo delegation failure was widely covered in the tech media.



Vimeo Description

Describes how root certificate authorities delegate certificate signing to third party resellers, and how such certificates are validated.

Video notes: cys.me/vid/c15

The previous video describes how browsers handle multiple certificate authorities for validating public-key certificates vimeo.com/208879048

See the entire Cryptosmith series in its album vimeo.com/album/4229550

ACSAC Android Apple attacks authentication Bitcoin Boak Calibre certificates CIA properties classified Clinton cloud computing Coursera CPU cracking crypto cybercurrency databases design principles domain names Drupal ebooks elections email encrypted messages evaluations file systems flaws Ft. Meade GUI history iOS iPhone KGB Kindle library malware memory sizes Microsoft mobile security MSSE Multics NSA NSTISSI 4011 OPDS passwords phishing President quantum Quizlet RAM risks secrecy spam SSL stream cipher TCSEC Top Secret training Trump UMN video Wordpress xor