Digital certificates rely on trust but trust can come in different forms. In this video, explore different trust models and learn how each works.
- [Narrator] The concept of trust plays a big role…in cyber security.…And it also does in cryptography,…there are multiple different ways of thinking of trust,…and there are four different trust models that we think of…in digital certificates.…First a single authority, hierarchical trust,…web of trust and cross certification.…The single authority trust,…it means there is a single third party agency…that is trusted, and only keys that are signed…by that single authority are trusted.…So I have a single point…that I am considering my ground truth,…I will accept anything that is signed…or generated by that single authority,…my single ground truth.…
Next is hierarchical trust.…This is the idea that I have…essentially kind of a tree of trust.…I have my root certificate authority,…so my original ground truth,…so it starts thinking very similar…to the single authority but what I've gone…and as I've expanded to say that, yes,…I have this single ground truth,…but because I trust that ground truth,…I will also trust any intermediate certificates…
Released
12/9/2019Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks
Share this video
Embed this video
Video: Trust models