@@ -98,14 +98,16 @@ perhaps directly from Alice—as long as they trust Bob and know his
9898public key. You can see how starting from a very small number of keys
9999(in this case, just Bob’s) you could build up a large set of trusted
100100keys over time. Bob in this case is playing the role often referred to
101- as a *certification authority * (CA), and much of today’s Internet
102- security depends on CAs. VeriSign is one well-known commercial CA.
101+ as a *certificate authority * (CA), and much of today’s Internet
102+ security depends on CAs. There are many commercial and non-profit CAs
103+ in widespread use today. You may also see CA expanded as
104+ *certification authority *—the two expansions are equivalent.
103105
104106One thing to note about the above example is that we have to know two
105107things about Bob. First, we need to know his public key so that we can
106108verify that certain messages were originated by Bob. But we also have
107109to know that Bob is trustworthy enough to make statements about the
108- keys of others, which is where certification authorities (rather than
110+ keys of others, which is where certificate authorities (rather than
109111random individuals) come into play. We return to this topic below.
110112
111113One of the major standards for certificates is known as X.509. This
@@ -138,7 +140,7 @@ domains.
138140There are different ways a PKI could formalize the notion of trust. We
139141discuss the two main approaches.
140142
141- 4.1.1 Certification Authorities
143+ 4.1.1 Certificate Authorities
142144~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
143145
144146In the first model, trust is binary; you either trust someone
@@ -152,10 +154,10 @@ In other words, all you need is a chain of certificates, all signed by
152154entities you trust, as long as it leads back to an entity whose key you
153155already know.
154156
155- A *certification authority * or *certificate authority * (CA) is an entity
157+ A *certificate authority * or *certification authority * (CA) is an entity
156158claimed (by someone) to be trustworthy for verifying identities and
157159issuing public key certificates. There are commercial CAs, governmental
158- CAs, and even free CAs. To use a CA, you must know its own key. You can
160+ CAs, and non-profit CAs. To use a CA, you must know its own key. You can
159161learn that CA’s key, however, if you can obtain a chain of CA-signed
160162certificates that starts with a CA whose key you already know. Then you
161163can believe any certificate signed by that new CA.
@@ -172,7 +174,7 @@ trust for that participant.
172174 :width: 600px
173175 :align: center
174176
175- Tree-structured certification authority hierarchy.
177+ Tree-structured certificate authority hierarchy.
176178
177179There are some significant issues with building chains of trust. Most
178180importantly, even if you are certain that you have the public key of the
@@ -296,7 +298,7 @@ distribution of the CRL to prolong the amount of time they can use the
296298compromised key. A number of proposals have been made to improve the
297299effectiveness of certificate revocation, such as using bit vectors or
298300other compact representations of the CRL to reduce its size, and the
299- development of the Online Certification Status Protocol (OCSP) to
301+ development of the Online Certificate Status Protocol (OCSP) to
300302enable real-time checks on a certificate's status. At the time of
301303writing, there are some best practices for handling certificate
302304revocation but no comprehensive solution. A good discussion of the
@@ -306,9 +308,9 @@ revocation can be found in the blog post below.
306308.. admonition :: Further Reading
307309
308310 J. Schank. `CRLite: Fast, private, and comprehensive certificate
309- revocation checking in Firefox
310- <https://hacks.mozilla.org/2025/08/crlite-fast-private-and-comprehensive-certificate-revocation-checking-in-firefox/> `__. Mozilla
311- blog, August 2025.
311+ revocation checking in Firefox
312+ <https://hacks.mozilla.org/2025/08/crlite-fast-private-and-comprehensive-certificate-revocation-checking-in-firefox/> `__. Mozilla
313+ blog, August 2025.
312314
3133154.2 Distribution of Secret Keys
314316------------------------------------
0 commit comments