Question: (Digital Signatures, Certificates, PKI) --- (Encryption and Authentication) 1. Suppose a CA is maliciously corrupt. What bad things could the CA accomplish? Be as specific
(Digital Signatures, Certificates, PKI) --- (Encryption and Authentication)
1. Suppose a CA is maliciously corrupt. What bad things could the CA accomplish? Be as specific as possible. 2. Suppose the malicious CA in the previous question is not a root CA, but an intermediate CA in a hierarchical system. How could the damage the corrupt CA can cause be limited or stopped in this scenario?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
