1 00:00:01,600 --> 00:00:07,400 Welcome to the lecture devoted to cryptology this time we exam the operating principle of the public 2 00:00:07,400 --> 00:00:09,770 key infrastructure. 3 00:00:09,850 --> 00:00:14,760 This is the best mechanism that computerise society has managed to develop. 4 00:00:14,760 --> 00:00:18,240 It allows us to implement the principle of trust but control 5 00:00:20,850 --> 00:00:25,620 in this module will discuss the purpose and content of certificates which are compatible with the x 6 00:00:25,620 --> 00:00:30,270 5 or 9 standard. 7 00:00:30,450 --> 00:00:33,330 We will consider what role certificates play. 8 00:00:33,330 --> 00:00:36,190 In other words why they should be issued. 9 00:00:36,270 --> 00:00:43,140 We'll talk about why certification authorities help build a relationship of trust will say a few words 10 00:00:43,140 --> 00:00:45,910 about two models for building relationships of trust. 11 00:00:48,720 --> 00:00:54,390 Will show in particular why certificates shouldn't be trusted too quickly especially certificates of 12 00:00:54,390 --> 00:00:56,220 other certification authorities. 13 00:00:58,580 --> 00:01:04,620 We'll consider how to plan your own certification authority structure will express what benefits we'll 14 00:01:04,620 --> 00:01:09,090 have from issuing certificates ourselves to users of our computer system. 15 00:01:09,240 --> 00:01:11,310 Instead of buying individual certificates 16 00:01:13,880 --> 00:01:18,320 we'll say a few words about the configuration and installation techniques of the root certification 17 00:01:18,320 --> 00:01:24,990 authority in the Microsoft Windows environment will consider among other things why this authority should 18 00:01:24,990 --> 00:01:27,360 be an offline authority and what this means 19 00:01:30,870 --> 00:01:36,060 will learn how to install an additional subordinate's certification authority and what obligations are 20 00:01:36,060 --> 00:01:40,960 related to the management of certification authorities and the certificates issued by these authorities. 21 00:01:42,080 --> 00:01:49,210 We'll tell you why this separation is important in the end will devote a few minutes to subjects connected 22 00:01:49,210 --> 00:01:52,400 with archiving private user keys. 23 00:01:52,430 --> 00:01:57,500 We'll tell you when this makes sense and what risk to the security of the system or connected with it. 24 00:01:59,270 --> 00:02:05,960 Well summarize by stating the practical applications of using public key infrastructures. 25 00:02:05,970 --> 00:02:07,100 Let's get started.