Table of Contents
PKI
Components of a PKI
PKI: What It Appears to Do
Conventional Transaction vs. PKI Transaction
PKI Justifications
Common Public-Key Algorithms
Hierarchical Certification
Relational Certification
Certification Models
Levels of ‘Nymity’
Typical Transaction
The CA as Trust Proxy: Basic Principles
The Certificate Policy: What It Should Not Do
The Certificate Policy: What It Should Do
When Is the CA Responsible for Security Failures?
Three Levels of Validation
How Much Is the CA Responsible for?
Summary
|