| Table of ContentsPKI Components of a PKI PKI: What It Appears to Do Conventional Transaction vs. PKI Transaction PKI Justifications Common Public-Key Algorithms Hierarchical Certification Relational Certification Certification Models Levels of ‘Nymity’ Typical Transaction The CA as Trust Proxy: Basic Principles The Certificate Policy: What It Should Not Do The Certificate Policy: What It Should Do When Is the CA Responsible for Security Failures? Three Levels of Validation How Much Is the CA Responsible for? Summary |