ABSTRACT
The root key is primarily responsible for digitally signing
subordinate Certificate Authorities (CAs). A compromise
of the root means that an unauthorized CA will appear
perfectly valid to users. Users will then engage in a trans-
action completely unaware that the security upon which
they are relying is worse than worthless.