Chapter 13. Public Key Infrastructure
On completing this chapter, you will be able to
Describe the exchange of keys in a PKI
Explain the concept of a trusted third party
Compare the topologies of hierarchical and cross-certified CAs
Outline the procedure of adding a PKI user to a PKI
Describe the function of a certificate revocation list
This chapter provides an overview of the Public Key Infrastructure (PKI) technologies that are widely used in today's computing and networking. PKI can be used as a framework for security services such as encryption, authentication, and nonrepudiation. Because you can use PKI to build scalable solutions, PKI is becoming an important solution for authenticating virtual private networks (VPNs).