Changes

An Overview of Public Key Infrastructures (PKI)

75 bytes added, 19:01, 20 July 2009
no edit summary
<hr>
<google>BUY_SECURITYPLUS</google>
In the previous chapter we looked at the concepts of symmetrical and public (asymmetrical) key encryption and learned about confidentiality, integrity, nonrepudiation and authentication. In this chapter we will look in detail at Public Key Infrastructures.
It is important to note that these distinctions are not necessarily mutually exclusive and that there is room for some overlap. For example, in a decentralized environment it is still possible for the keys to be generated by the local system, and the public key then provided to the central server for the creation and distribution of the corresponding certificate.
<google>BUY_SECURITYPLUS_BOTTOM</google>
<hr>