Certificates and Public Key Infrastructure

Certificates and Public Key Infrastructure

Manuel Mogollon
Copyright: © 2008 |Pages: 29
ISBN13: 9781599048376|ISBN10: 159904837X|ISBN13 Softcover: 9781616927301|EISBN13: 9781599048390
DOI: 10.4018/978-1-59904-837-6.ch009
Cite Chapter Cite Chapter

MLA

Manuel Mogollon. "Certificates and Public Key Infrastructure." Cryptography and Security Services: Mechanisms and Applications, IGI Global, 2008, pp.217-245. https://doi.org/10.4018/978-1-59904-837-6.ch009

APA

M. Mogollon (2008). Certificates and Public Key Infrastructure. IGI Global. https://doi.org/10.4018/978-1-59904-837-6.ch009

Chicago

Manuel Mogollon. "Certificates and Public Key Infrastructure." In Cryptography and Security Services: Mechanisms and Applications. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-837-6.ch009

Export Reference

Mendeley
Favorite

Abstract

In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its integrity and to avoid spoofing and playback attacks. A user’s public key can be authenticated (signed) by a certificate authority that verifies that a public key belongs to a specific user. In this chapter, digital certificates, which are used to validate public keys, and certificate authorities are discussed. When public-key is used, it is necessary to have a comprehensive system that provides public key encryption and digital signature services to ensure confidentiality, access control, data integrity, authentication, and non-repudiation. That system, public-key infrastructure or PKI, is also discussed in this chapter.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.