Diff for Introductions to PKI

Mon, 10/29/2007 - 02:33 by Stephen.WilsonThu, 11/08/2007 - 17:54 by Stephen.Wilson
Changes to Title
-
Introductions to PKI (2)
+
Introductions to PKI
Changes to Body
Line 1Line 1
  +
<p>
  +
There are a great many introductions to PKI available online (and in text books).
  +
</p>
  +
<p>
  +
Newcomers to the field should be aware that PKI has shifted ground subtly since the mid 00's, rendering older introductions a ittle staid and one dimensional. In particular, &quot;PKI 101&quot; materials tend to focus on e-mail as an archetypal application and the task of two strangers (cryptography's comic book heros Alice and Bob) identifying and hence &quot;trusting&quot; one another. Modern PKI is more nuanced -- with a concern for credentials, qualifications and attributes rather than personal identity -- and involvesa plurality of different certificates for different contexts. E-mail is not a great PKI application in practice; better examples are found in special purpose B2B applications and in embedded systems. SeeCase Studies.
  +
</p>
  +
<p>
  +
The original PKI Forum (the forerunner to the OASIS IDtrust Member Section) produced two &quot;PKI Basics&quot; papers: <a href="/pki-basics-technical-perspective" target="_blank">A Technical Perspective</a> and <a href="/pki-basics-business-perspective" target="_blank">A Business Perspective</a>.
  +
</p>
  +
<p>
  +
See also <strong>Robert J. Brentrup</strong>, <em><a href="http://www.campustechnology.com/article.aspx?aid=39377" target="_blank">Public Key Cryptography Demystified</a>, </em>Campus Technology, 4/29/2003.
  +
</p>
  +
<p>
  +
The American Bar Associatin has developed a useful <a href="/digital-signature-tutorial" target="_blank">Digital Signature Tutorial </a>that crosses over between technlogy and the fundamental legal issues.
  +
</p>
 
<p>
 
<p>
 
&nbsp;
 
&nbsp;
 
</p>
 
</p>
 
<p>
 
<p>
-
The original PKI Forum produced two &quot;PKI Basics&quot; papers: xxx and yyy.
+
&nbsp;
 
</p>
 
</p>
 
 
Changes to Attachments
-
PKI_Basics-A_technical_perspective.pdf
  
Current revision:

Introductions to PKI

There are a great many introductions to PKI available online (and in text books).

Newcomers to the field should be aware that PKI has shifted ground subtly since the mid 00's, rendering older introductions a ittle staid and one dimensional. In particular, "PKI 101" materials tend to focus on e-mail as an archetypal application and the task of two strangers (cryptography's comic book heros Alice and Bob) identifying and hence "trusting" one another. Modern PKI is more nuanced -- with a concern for credentials, qualifications and attributes rather than personal identity -- and involvesa plurality of different certificates for different contexts. E-mail is not a great PKI application in practice; better examples are found in special purpose B2B applications and in embedded systems. SeeCase Studies.

The original PKI Forum (the forerunner to the OASIS IDtrust Member Section) produced two "PKI Basics" papers: A Technical Perspective and A Business Perspective.

See also Robert J. Brentrup, Public Key Cryptography Demystified, Campus Technology, 4/29/2003.

The American Bar Associatin has developed a useful Digital Signature Tutorial that crosses over between technlogy and the fundamental legal issues.

 

 

XML.org Focus Areas: BPEL | DITA | ebXML | IDtrust | OpenDocument | SAML | UBL | UDDI
OASIS sites: OASIS | Cover Pages | XML.org | AMQP | CGM Open | eGov | Emergency | IDtrust | LegalXML | Open CSA | OSLC | WS-I