Table of Contents
Components of a PKI
PKI: What It Appears to Do
Conventional Transaction vs. PKI Transaction
Common Public-Key Algorithms
Levels of ‘Nymity’
The CA as Trust Proxy: Basic Principles
The Certificate Policy: What It Should Not Do
The Certificate Policy: What It Should Do
When Is the CA Responsible for Security Failures?
Three Levels of Validation
How Much Is the CA Responsible for?