O'Reilly logo

Security without Obscurity by W. Clay Epstein, Jeff Stapleton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Advanced PKI

This book has focused on public key infrastructure operations as they are today, from the short history of asymmetric cryptography to the plethora of various standards and specifications. More importantly, we have not addressed any particular products in this book, as each software and hardware solution have their own issues and lifecycles. Each product itself, might be worth its own book. Regardless, some products follow standards and specifications pragmatically, and some might have technology gaps, while others might have proprietary solutions. In general, this book has identified various issues managing PKI systems.

  • In Chapter 1, the “Introduction,” we described PKI cryptonomics consisting of legal, business, technology, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required