CHAPTER 37
PKI AND CERTIFICATE AUTHORITIES
Santosh Chokhani, Padgett Peterson, and Steven Lovaas
37.1.1 Symmetric Key Cryptography
37.1.2 Public Key Cryptosystem
37.1.3 Advantages of Public Key Cryptosystem over Secret Key Cryptosystem
37.2 NEED FOR PUBLIC KEY INFRASTRUCTURE
37.4 ENTERPRISE PUBLIC KEY INFRASTRUCTURE
37.6 GLOBAL PUBLIC KEY INFRASTRUCTURE
37.6.5 Choosing a Public Key Infrastructure Architecture
37.6.7 Public Key Infrastructure Interoperability
37.7.1 Types of Revocation-Notification Mechanisms
37.7.2 Certificate Revocation Lists and Their Variants
37.7.3 Server-Based Revocation Protocols
37.7.4 Summary of Recommendations for Revocation Notification
37.11 TRUSTED ARCHIVAL SERVICES AND TRUSTED TIME STAMPS
37.12 COST OF PUBLIC KEY INFRASTRUCTURE
37.1 INTRODUCTION.
Where at one time the use of encryption across the Internet consisted mainly of individuals with Pretty Good Privacy (PGP) exchanging secure e-mail and each maintaining a private “web of trust,” today's use of encryption encompasses a much wider range of elements including proofing, issuance, revocation, identification, federation, bridging, encryption, digital signing and a myriad of ancillary ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.