Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Introduction to Public Key Infrastructures

Introduction to Public Key Infrastructures

Buchmann, Johannes A., Karatsiolis, Evangelos, Wiesmaier, Alexander

2013, XV, 194 p. 146 illus.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$49.99

(net) price for USA

ISBN 978-3-642-40657-7

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$69.99

(net) price for USA

ISBN 978-3-642-40656-0

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

  • Explains the most important concepts, standards, implementations, and applications
  • All chapters contain exercises, solutions provided in an appendix
  • Suitable for advanced undergraduate and graduate university courses and for self-study by researchers and practitioners

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. 

In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI.

This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Content Level » Upper undergraduate

Keywords » Certificates, certification (security) - Cryptography - Cryptology - Digital signatures - Direct trust - Electronic signatures - Hash functions - Hybrid encryption - Identity-based cryptography - Key ring - Message authentication codes (MACs) - Non-repudiation - Object identifiers - Personal security environment (PSE) - Private-key encryption - Public-key cryptography (PKC) - Public-key encryption - Public-key infrastructure (PKI) - Secret-key encryption; - Smart cards - Trust signatures - Validity models - Virtual private network (VPN) - Web of trust model - X.509 certificates

Related subjects » Applied & Technical Physics - Business Information Systems - Security and Cryptology

Table of contents 

Chap. 1 The Purpose of PKI.- Chap. 2 Certificates.- Chap. 3 Trust Models.- Chap. 4 Private Keys.- Chap. 5 Revocation.- Chap. 6 Validity Models.- Chap. 7 Certification Service Provider.- Chap. 8 Certificate Policies.- Chap. 9 Certification Paths: Retrieval and Validation.- Chap. 10 PKI in Practice.- App. A A Basic Path Validation Algorithm.- App. B Exercise Solutions.- Index.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Structures, Cryptology and Information Theory.