Chapter 49: Public Key Infrastructure

Terence Spies     Hewlett Packard Enterprise, Cupertino, CA, United States

Abstract

Cryptographic algorithms are used for important tasks such as data encryption, authentication, and digital signatures, but one problem has to be solved to enable these algorithms: binding cryptographic keys to machine or user identities. Public key infrastructure (PKI) systems are built to bridge useful identities (email addresses, Domain Name System addresses, etc.) and the cryptographic keys used to authenticate or encrypt data passing among these identities. This chapter will explain the cryptographic background that forms the foundation of PKI systems, the mechanics of the X.509 PKI system (as elaborated by a number of standards ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.