Click here to start

Table of Contents


Components of a PKI

PKI: What It Appears to Do

Conventional Transaction vs. PKI Transaction

PKI Justifications

Common Public-Key Algorithms

Hierarchical Certification

Relational Certification

Certification Models

Levels of ‘Nymity’

Typical Transaction

The CA as Trust Proxy: Basic Principles

The Certificate Policy: What It Should Not Do

The Certificate Policy: What It Should Do

When Is the CA Responsible for Security Failures?

Three Levels of Validation

How Much Is the CA Responsible for?


Author: Mark Chen