๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Public Key Infrastructure and Implementation and Design

โœ Scribed by Suranjan Choudhury


Publisher
Wiley
Year
2002
Tongue
English
Leaves
320
Edition
1st
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Public Key Infrastructure Implementation and Design is a complete, concise guide for professionals. This book offers a complete reference on all aspects of public key infrastructure including architecture, planning, implementation, cryptography, standards and certificates.

โœฆ Table of Contents


Public Key Infrastructure Implementation and Design......Page 5
Table of Contents......Page 2
What the Book Is About......Page 8
How This Book Is Organized......Page 9
What Conventions Are Used in the Book......Page 11
In This Chapter......Page 12
The Basics of Cryptography......Page 15
Applications of Cryptography......Page 25
Digital Signatures......Page 30
Summary......Page 32
What Is PKI?......Page 33
Components of PKI......Page 34
Working with PKI......Page 36
Processes in PKI......Page 38
Summary......Page 41
Introduction to PKI Architecture......Page 43
Single CA Architecture......Page 44
Enterprise PKI Architecture......Page 48
Hybrid PKI Architecture......Page 53
Summary......Page 60
Functions of a CA......Page 62
Issuing Certificates......Page 63
Formulating a Certificate Policy......Page 65
Certification Practice Statement (CPS)......Page 67
Sample CPS for AllSolv, Inc. Company......Page 69
Summary......Page 76
Certificate Enrollment and Registration Authority......Page 77
Maintaining Keys and Certificates......Page 80
Certificate Retrieval and Validation......Page 82
Methods of Certificate Revocation......Page 83
Summary......Page 92
PKI Management Protocols......Page 94
PKCS#10......Page 95
PKCS#7......Page 99
Certificate Management Protocol (CMP)......Page 104
Simple Certificate Enrollment Protocol......Page 106
The X Series Standards......Page 108
Summary......Page 113
SSL......Page 114
S/MIME......Page 120
IPSec......Page 122
Summary......Page 132
Installing a CA......Page 133
Issuing Certificates......Page 147
Revoking Certificates and Publishing CRLs......Page 151
Configuring a Public Key Group Policy......Page 155
Renewing Certificates......Page 156
Summary......Page 158
Installing and Configuring SSL......Page 159
Installing and Configuring IPSec......Page 166
Testing the IPSec Policy......Page 179
Configuring S/MIME......Page 181
Summary......Page 185
Introduction to Pretty Good Privacy (PGP)......Page 186
PGP Keys and Key Ring......Page 191
How PGP Works......Page 194
Web of Trust......Page 196
Summary......Page 197
Evaluating PKI Solutions......Page 199
Operational Requirements for PKI......Page 204
Deploying PKI......Page 207
Problems in PKI Deployment......Page 210
Legal Considerations......Page 212
Summary......Page 213
Introduction......Page 215
AllSolvs Architecture......Page 216
Digital Certificates......Page 217
The PKI Architecture and Distributor Relationship......Page 218
Securing AllSolvs Web Site......Page 219
Certificate Policy and CPS......Page 222
Business Enhancement by the Solution......Page 223
The Solution......Page 225
Summary......Page 227
Internet Domain Name System Security Extension......Page 228
Simple Distributed Security Infrastructure (SDSI)......Page 231
Introduction......Page 234
The Need for VPNs......Page 236
Working with a VPN......Page 237
Types of VPN......Page 238
Tunneling Protocols......Page 240
In This Appendix......Page 242
The LDAP Open Standard......Page 244
Glossary......Page 245
Index......Page 265
Chapter 3: PKI Architecture......Page 315
Chapter 8: Installing Windows 2000-Based PKI Solutions......Page 316
Chapter 9: Installing and Configuring Windows 2000 Certificate Server for SSL, IPSec, and S/MIME......Page 317
Chapter 10: Understanding PGP......Page 318
Appendix B: VPN Basics......Page 319
Appendix C: Cryptographic Algorithms......Page 320


๐Ÿ“œ SIMILAR VOLUMES


Systems and Network Infrastructure Integ
โœ Saida Helali ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› John Wiley & Sons, Incorporated ๐ŸŒ English

IT infrastructures are now essential in all areas and sectors of human activity; they are the cornerstone of any information system. Thus, it is clear that the greatest of care must be given to their design, implementation, security and supervision in order to ensure optimum functionality and better

Cryptography and Public Key Infrastructu
โœ Klaus Schmeh ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐ŸŒ English

A practical guide to Cryptography and its use in the Internet and other communication networks.This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elli

Cryptography and Public Key Infrastructu
โœ Klaus Schmeh ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Wiley ๐ŸŒ English

<I>Cryptography and Public Key Infrastructure on the Internet</I> provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers: <UL><LI>Public Key Infrastructures (PKIs); important w