Chapter 10
Advanced PKI
This book has focused on public key infrastructure operations as they are today, from the short history of asymmetric cryptography to the plethora of various standards and specifications. More importantly, we have not addressed any particular products in this book, as each software and hardware solution have their own issues and lifecycles. Each product itself, might be worth its own book. Regardless, some products follow standards and specifications pragmatically, and some might have technology gaps, while others might have proprietary solutions. In general, this book has identified various issues managing PKI systems.
- In Chapter 1, the “Introduction,” we described PKI cryptonomics consisting of legal, business, technology, ...
Get Security without Obscurity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.