Time to Read

2 minutes

What is Root Certificate?


A Root Certificate is a digital certificate that forms the basis of trust in the Public Key Infrastructure (PKI) system. It is issued by a trusted Certificate Authority (CA) and is used to verify the authenticity of SSL/TLS certificates issued by the CA. Root Certificates are stored in web browsers, operating systems, and other devices as part of their trust stores.

Here are the key characteristics of a Root Certificate:

  1. Issued by Trusted Certificate Authority (CA): Root Certificates are issued by established and trusted CAs, such as DigiCert, Let’s Encrypt, or Sectigo. These CAs have undergone rigorous audits and adhere to industry standards to ensure the security and integrity of their certificates.
  2. Self-Signed: Root Certificates are typically self-signed, meaning they are signed by their own private key. Since there is no higher authority to sign the root certificate, its authenticity is established based on the trustworthiness of the CA that issued it.
  3. Trusted Anchor: Root Certificates serve as the trust anchor for SSL/TLS certificate chains. When a web browser or device encounters an SSL/TLS certificate issued by a CA, it verifies the certificate’s authenticity by tracing the certificate chain back to a trusted root certificate stored in its trust store.
  4. Included in Trust Stores: Root Certificates are included in the trust stores of web browsers, operating systems, and other software applications. This allows them to verify SSL/TLS certificates presented by websites and establish secure connections.
  5. Hierarchy of Trust: Root Certificates may be used to issue intermediate certificates, which in turn are used to issue end-entity certificates (such as SSL/TLS certificates for websites). This creates a hierarchy of trust, with the root certificate at the top, followed by intermediate certificates, and finally end-entity certificates.
  6. Long Validity Period: Root Certificates typically have long validity periods, often ranging from several years to decades. This ensures continuity and stability in the trust infrastructure.

In summary, a Root Certificate is a foundational component of the PKI system, establishing trust in SSL/TLS certificates issued by trusted Certificate Authorities. It serves as the root of trust for verifying the authenticity of digital certificates and enabling secure communication over the internet.


Discover more from Sanchit Gurukul

Subscribe to get the latest posts to your email.



Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.



Discover more from Sanchit Gurukul

Subscribe now to keep reading and get access to the full archive.

Continue reading