Chapter 39

Public Key Infrastructure

Terence Spies,    Voltage Security

The ability to create, manipulate, and share digital documents has created a host of new applications (email, word processing, e-commerce websites), but also created a new set of problems, namely how to protect the privacy and integrity of digital documents when stored and transmitted. The invention of public key cryptography in the 1970s [1] pointed the way to a solution to those problems, most importantly the ability to encrypt data without a shared key, and the ability to “sign” data, insuring its origin and integrity. While these operations are quite conceptually simple, they both rely on the ability to bind a public key (which is typically a large mathematical object) ...

Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.