Skip to main content

Learn digital trust topics, one bite at a time.


Private and Public Keys

Public and private keys enable secure communication and identity verification online. Public keys encrypt data, while private keys decrypt it and sign digital documents. This system ensures privacy, authenticity, and trust across websites, emails, and transactions.

YouTube Short

Digests

Digital digests are cryptographic fingerprints used to verify data integrity. Created by hashing algorithms, they produce a fixed-length string unique to the original content. Even a small change alters the digest, making it ideal for detecting tampering. By comparing digests, users can confirm authenticity without relying on central authorities—building trust through math.

YouTube Short

Digital signatures

Digital signatures ensure the authenticity and integrity of digital content using cryptographic tools. A unique digest of the content is created through hashing, then encrypted with the signer’s private key to form the signature. To verify it, the recipient recalculates the digest and compares it to the decrypted signature using the signer’s public key. A match confirms the content is unchanged and genuinely signed; a mismatch indicates tampering or an invalid signature.

YouTube Short

DIDs and Key Rotation

Decentralized Identifiers (DIDs) and key rotation protect digital identities when private keys are compromised. Key rotation replaces old keys with new ones, and DIDs track these changes without relying on central authorities. Stored on decentralized systems, DIDs link to DID documents showing valid keys and updates—ensuring secure, self-managed identity verification.

YouTube Short

Verifiable Credentials

Verifiable credentials are digital proofs of identity or qualifications, similar to physical documents like passports. Instead of physical security features, they use cryptographic signatures from trusted issuers to confirm authenticity. When presented, a verifier checks the credential’s digital signature against the issuer’s public key—often retrieved via decentralized identifiers (DIDs)—to confirm it’s valid and untampered. This system enables secure, private, and decentralized verification of personal claims online.

YouTube Short

Identifiers

Identifiers are labels used to refer to things—like people, documents, or data—in both physical and digital contexts. They come in two types: assigned identifiers, given by an authority (e.g., passport numbers or student IDs), and derived identifiers, generated from the content itself using hashing algorithms. Derived identifiers act as digital fingerprints that change if the content changes, making them useful for verifying integrity. Both types are essential for organizing, referencing, and ensuring trust in digital systems.

YouTube Short

Self-certifying Identifiers

Self-certifying identifiers are cryptographically derived identifiers that prove their own authenticity without relying on a central authority. Unlike assigned identifiers (like passport numbers), these are created by hashing content—often including a public key—so any change to the key alters the identifier itself. This makes them tamper-evident and verifiable. Used in systems like Decentralized Identifiers (DIDs), they enable secure, trustless identity verification by embedding cryptographic trust directly into the identifier.

YouTube Short

Where DID Documents List

DID Documents—files that describe public keys, authentication methods, and service endpoints—can be stored in various ways depending on the DID method. Some methods store them on blockchains for immutability (e.g., did:indy), others use content-addressable systems like IPFS (did:ipfs) for tamper-evidence. Web-hosted DIDs (did:web) are easy to publish but rely on website control. Event-log-based methods like did:keri track changes over time, while peer and key-based DIDs share data directly or derive it from keys for lightweight, private use. Despite different storage models, all resolve to a standard W3C DID Document, ensuring interoperability across systems.

YouTube Short

Resolving a DID

Resolving a Decentralized Identifier (DID) means converting it into a DID Document containing public keys, service endpoints, and metadata for secure interactions. The resolution process varies by DID method. Some, like did:web, use domain-based URLs and HTTPS to fetch the document. Others, like did:indy, query blockchains to reconstruct the document from signed operations. Lightweight methods like did:key generate the document locally from embedded key material, while did:peer involves direct exchange between parties. Hybrid approaches may store document digests on-chain for tamper-evidence. Despite different resolution models, all produce a standard W3C DID Document, ensuring interoperability and trust.

YouTube Short

Detecting DID Document Duplicity

Detecting duplicity in DID documents is crucial for maintaining trust in decentralized identity systems. Since DID controllers can update their documents—including public keys—malicious changes may go unnoticed if not externally monitored. To prevent this, some DID methods store documents or their cryptographic digests on tamper-resistant public ledgers (e.g., did:indy, did:ipfs, or Ethereum), making unauthorized changes detectable. Others, like did:keri, use decentralized networks of observers to track and verify document history. These external verification mechanisms ensure that any attempt to alter identity records without accountability can be identified, preserving the integrity of the system.

YouTube Short

Contributors and consultants:
Carly Huitema (lead), Eric Drury, Neil Thomson, Scott Perry, Drummond Reed, Wenjing Chu, Steven Milstein, Jim Mason, Markus Sabadello, Alex Tweeddale, Stephen Curran, Nicholas Racz, Darrell O’Donnell, Daniel Bachenheimer