Introduction to Public Key Infrastructures

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection tech...

Full description

Main Authors: Buchmann, Johannes A. (Author, http://id.loc.gov/vocabulary/relators/aut), Karatsiolis, Evangelos. (http://id.loc.gov/vocabulary/relators/aut), Wiesmaier, Alexander. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Edition:1st ed. 2013.
Subjects:
Online Access:https://doi.org/10.1007/978-3-642-40657-7
Table of Contents:
  • Chap. 1 The Purpose of PKI
  • Chap. 2 Certificates
  • Chap. 3 Trust Models
  • Chap. 4 Private Keys
  • Chap. 5 Revocation
  • Chap. 6 Validity Models
  • Chap. 7 Certification Service Provider
  • Chap. 8 Certificate Policies
  • Chap. 9 Certification Paths: Retrieval and Validation
  • Chap. 10 PKI in Practice
  • App. A A Basic Path Validation Algorithm
  • App. B Exercise Solutions
  • Index.