Strategies & Issues: Public Key Infrastructure Nuts and Bolts

    Date12 Nov 2001
    CategoryCryptography
    3870
    Posted ByAnthony Pell
    Like a successful public works project, a good Public Key Infrastructure (PKI) should also be invisible to its end users, whether they're company employees, business partners, or customers. Similarly, PKI and the digital certificates that are its stock in trade can be complex and complicated-the potential for messy mishaps is high.. . . Like a successful public works project, a good Public Key Infrastructure (PKI) should also be invisible to its end users, whether they're company employees, business partners, or customers. Similarly, PKI and the digital certificates that are its stock in trade can be complex and complicated-the potential for messy mishaps is high.

    However, such projects are undertaken because the infrastructure meets a compelling need. So what drives PKI? The answer is e-business.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"4","type":"x","order":"1","pct":80,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":20,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.