ABSTRACT

The root key is primarily responsible for digitally signing

subordinate Certificate Authorities (CAs). A compromise

of the root means that an unauthorized CA will appear

perfectly valid to users. Users will then engage in a trans-

action completely unaware that the security upon which

they are relying is worse than worthless.