PKI

9/29/00


Click here to start


Table of Contents

PKI

Components of a PKI

PKI: What It Appears to Do

Conventional Transaction vs. PKI Transaction

PKI Justifications

Common Public-Key Algorithms

Hierarchical Certification

Relational Certification

Certification Models

Levels of ‘Nymity’

Typical Transaction

The CA as Trust Proxy: Basic Principles

The Certificate Policy: What It Should Not Do

The Certificate Policy: What It Should Do

When Is the CA Responsible for Security Failures?

Three Levels of Validation

How Much Is the CA Responsible for?

Summary

Author: Mark Chen