Skip to Main Content
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
book

Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations

by Carlisle Adams, Steve Lloyd
November 1999
Intermediate to advanced content levelIntermediate to advanced
320 pages
8h 46m
English
Sams
Content preview from Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations

User Key Compromise

The topic of key compromise (that is, disclosure of a private key to an unauthorized or unintended party) can be considered in two contexts:

  • Compromise of an end-entity private key

  • Compromise of a CA private key

Because disclosure of a CA private key is considerably more disastrous than disclosure of an end-entity key, that aspect of key compromise is discussed in the following section, "Disaster Preparation and Recovery;" this section will focus on end-entity (or user) key compromise.

Knowing or Suspecting Key Compromise

How does Alice come to know or suspect that her key has been compromised? Unfortunately, there are few simple, concrete answers. The difficulty, of course, is that this is not equivalent to Eve breaking into ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Access Control, Authentication, and Public Key Infrastructure

Access Control, Authentication, and Public Key Infrastructure

Bill Ballad, Tricia Ballad, Erin Banks
Access Control, Authentication, and Public Key Infrastructure, 2nd Edition

Access Control, Authentication, and Public Key Infrastructure, 2nd Edition

Mike Chapple, Bill Ballad, Tricia Ballad, Erin Banks
Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide

Jason Garbis, Jerry W. Chapman

Publisher Resources

ISBN: 157870166XPurchase book