文档介绍:This document is created with the unregistered version of CHM2PDF Pilot
I ******@ve RuBoard
• Table of Contents
Understanding PKI: Concepts, Standards, and Deployment
Considerations, Second Edition
By Carlisle Adams, Steve Lloyd
Publisher : Addison Wesley
Pub Date : November 06, 2002
ISBN : 0-672-32391-5
Pages : 352
PKI (public-key infrastructure) enables the secure exchange of data over
otherwise unsecured media, such as the . PKI is the underlying
cryptographic security mechanism for digital certificates and certificate
directories, which are used to authenticate a message sender. Because PKI is
the standard for mercial electronic transactions,
Understanding PKI, Second Edition, work and security architects
with the tools they need to grasp each phase of the key/certificate life cycle,
including generation, publication, deployment, and recovery.
I ******@ve RuBoard
This document is created with the unregistered version of CHM2PDF Pilot
I ******@ve RuBoard
• Table of Contents
Understanding PKI: Concepts, Standards, and Deployment
Considerations, Second Edition
By Carlisle Adams, Steve Lloyd
Publisher : Addison Wesley
Pub Date : November 06, 2002
ISBN : 0-672-32391-5
Pages : 352
Copyright
Foreword
Preface
Motivations for PKI
Changes in the Second Edition
Audience
Organization
Part I: Concepts
Part II: Standards
Part III: Deployment Considerations
About the Authors
Part I: Concepts
Chapter 1. Introduction
This document is created with the unregistered version of CHM2PDF Pilot
Chapter 2. Public-Key Cryptography
Symmetric versus Asymmetric Ciphers
Public/Private-Key Pair
Services of Public-Key Cryptography
Algorithms
Summary
Chapter 3. The Concept of an Infrastructure
Pervasive Substrate
Application Enabler
Business Drivers
Public-Key Infrastructure Defined
Summary
Chapter 4. Core PKI Services: Authentication, Integrity, and Confidentiality
Definitions
Mechanisms
Operatio