Introduction to Public Key Infrastructures

Author: Johannes A. Buchmann
Publisher: Springer Science & Business Media
ISBN: 9783642406577
Release Date: 2013-11-19
Genre: Computers

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Understanding PKI

Author: Carlisle Adams
Publisher: Addison-Wesley Professional
ISBN: 0672323915
Release Date: 2003
Genre: Computers

Introduces the concepts of public key infrastructure design and policy and discusses use of the technology for computer network security in the business environment.

Understanding PKI

Author: Carlisle Adams
Publisher: Addison-Wesley Professional
ISBN: 0672323915
Release Date: 2003
Genre: Computers

Introduces the concepts of public key infrastructure design and policy and discusses use of the technology for computer network security in the business environment.

Planning for PKI

Author: Russ Housley
Publisher: John Wiley & Sons
ISBN: UOM:39015049731063
Release Date: 2001-03-27
Genre: Computers

"Planning for PKI" examines this cornerstone Internet security technology.Written by the architects of the Internet Public Key Infrastructure (PKI),this book provides authoritative technical guidance for network engineers,architects, and managers who need to implement the right PKI architecture for their organization. Readers will learn that building a successful PKI is an on going process, not a one-time event. The authors discuss results and lessons learned from three early PKI deployments, helping readers avoid the pitfalls and emulate the successes of early PKI adopters. Using plain and direct language, the authors share their extensive knowledge of PKI standards development in the Internet Engineering Task Force (IETF) and elsewhere. Subtle points about the Internet PKI standards are liberally sprinkled throughout the book. These nuggets provide insight into the intent of some of the esoteric topics in the standards, enabling greater interoperability. "Planning for PKI" gathers the PKI state-of-the-art into one volume, covering everything from PKI history to emerging PKI-related technologies.

Cryptography and Public Key Infrastructure on the Internet

Author: Klaus Schmeh
Publisher: John Wiley & Sons
ISBN: 9780470862483
Release Date: 2006-01-04
Genre: Computers

A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP protocols). * Details what the risks on the internet are and how cryptography can help * Includes a chapter on interception which is unique amongst competing books in this field * Explains Public Key Infrastructures (PKIs) - currently the most important issue when using cryptography in a large organisation * Includes up-to-date referencing of people, organisations, books and Web sites and the latest information about recent acts and standards affecting encryption practice * Tackles the practical issues such as the difference between SSL and IPSec, which companies are active on the market and where to get further information

PKI Implementing Managing E Security

Author: Andrew Nash
Publisher: McGraw Hill Professional
ISBN: 9780072192261
Release Date: 2001-04-17
Genre: Computers

Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series.

Rethinking Public Key Infrastructures and Digital Certificates

Author: Brands
Publisher: MIT Press
ISBN: 0262261669
Release Date: 2016
Genre: Computers

As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

Security without Obscurity

Author: Jeff Stapleton
Publisher: CRC Press
ISBN: 9781498788212
Release Date: 2016-04-05
Genre: Computers

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming. Security without Obscurity: A Guide to PKI Operations provides a no-nonsense approach and realistic guide to operating a PKI system. In addition to discussions on PKI best practices, the book supplies warnings against bad PKI practices. Scattered throughout the book are anonymous case studies identifying both good and bad practices. The highlighted bad practices, based on real-world scenarios from the authors’ experiences, illustrate how bad things are often done with good intentions but cause bigger problems than the original one being solved. This book offers readers the opportunity to benefit from the authors’ more than 50 years of combined experience in developing PKI-related policies, standards, practices, procedures, and audits, as well as designing and operating various commercial and private PKI systems.

PKI Uncovered

Author: Andre Karamanian
Publisher: Pearson Education
ISBN: 1587059304
Release Date: 2011-02-17
Genre: Computers

The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations.

Access Control Authentication and Public Key Infrastructure

Author: Bill Ballad
Publisher: Jones & Bartlett Publishers
ISBN: 9781449638399
Release Date: 2011-10-15
Genre: Computers

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. The first part of Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access contol programs. It then looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. The final part is a resource for students and professionals which disucsses putting access control systems to work as well as testing and managing them.

Computer and Information Security Handbook

Author: John R. Vacca
Publisher: Morgan Kaufmann
ISBN: 9780128039298
Release Date: 2017-05-10
Genre: Computers

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions

Public Key Infrastructure Implementation and Design

Author: Suranjan Choudhury
Publisher: John Wiley & Sons Incorporated
ISBN: 0764548794
Release Date: 2002-03-15
Genre: Computers

Public key infrastructure, or PKI, is a security system for e-mail, massaging, and e-commerce that uses digital certificates, cryptography, and certificate authorities to ensure data integrity and verify the identities of senders and receivers. This thorough, hands-on guide delivers all the know-how network administrators need to set up a state-of-the-art PKI system, from architecture, planning, and implementation to cryptography, standards, and certificates.

Digital Certificates

Author: Jalal Feghhi
Publisher: Addison-Wesley Professional
ISBN: 0201309807
Release Date: 1999
Genre: Computers

Digital certificates, a new form of electronic ID, is a new security technology that establishes a digital identity for a person or a company and guarantees the authenticity of information delivered over the Web or via email. This title explores all of the critical aspects of digital certificates in detail and provides basic information on cryptography. The CD-ROM contains a complete system for controlling access to information on the Internet based on digital certificate technology.

Windows Server 2008 PKI and Certificate Security

Author: Brian Komar
Publisher: Pearson Education
ISBN: 9780735646407
Release Date: 2008-04-09
Genre: Computers

Get in-depth guidance for designing and implementing certificate-based security solutions—straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration.

Auditing IT Infrastructures for Compliance

Author: Martin Weiss
Publisher: Jones & Bartlett Publishers
ISBN: 9781284090703
Release Date: 2015-07-10
Genre: Computers

The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data. Using examples and exercises, this book incorporates hands-on activities to prepare readers to skillfully complete IT compliance auditing.