Certificate Authorities and PKI

Summary

This chapter examines the centralized trust model built on certificate authorities and public key infrastructure. Students will learn how X.509 certificates establish identity, how certificate chains create hierarchies of trust, and critically, where this model is vulnerable. Understanding PKI strengths and weaknesses is essential for later evaluating whether blockchain offers genuine improvements or merely shifts the trust problem.

Concepts Covered

This chapter covers the following 13 concepts from the learning graph:

  1. Certificate Authority
  2. Public Key Infrastructure
  3. X.509 Certificate
  4. Certificate Chain
  5. Root Certificate
  6. Certificate Revocation
  7. CA Vulnerabilities
  8. CA Compromise Scenarios
  9. Trust Anchor
  10. Centralized Trust
  11. Traditional PKI vs DLT
  12. Centralized Database
  13. Alternative Technologies

Prerequisites

This chapter builds on concepts from:


TODO: Generate Chapter Content