Chapter 13. Public Key Infrastructure

On completing this chapter, you will be able to

  • Describe the exchange of keys in a PKI

  • Explain the concept of a trusted third party

  • Compare the topologies of hierarchical and cross-certified CAs

  • Outline the procedure of adding a PKI user to a PKI

  • Describe the function of a certificate revocation list

This chapter provides an overview of the Public Key Infrastructure (PKI) technologies that are widely used in today's computing and networking. PKI can be used as a framework for security services such as encryption, authentication, and nonrepudiation. Because you can use PKI to build scalable solutions, PKI is becoming an important solution for authenticating virtual private networks (VPNs).

Public Key Distribution ...

Get Network Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.