ABSTRACT

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act

chapter |6 pages

SECTION I: OVERVIEW OF PKI TECHNOLOGY

chapter 2|8 pages

GROWING A TREE OF TRUST

chapter 3|16 pages

IN PKI WE TRUST?

chapter 4|14 pages

PKI STANDARDS

chapter 5|12 pages

TYPES OF VENDOR AND THIRD-PARTY CA SYSTEMS

chapter 7|12 pages

CA SYSTEM ATTACKS

chapter 8|14 pages

KEY ESCROW VERSUS KEY RECOVERY

chapter 11|10 pages

PKI READINESS

part |2 pages

SECTION II: ANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURES

chapter 12|12 pages

PKI DESIGN ISSUES

chapter 13|6 pages

PKI RETURN ON INVESTMENT

chapter 14|12 pages

PKI STANDARDS DESIGN ISSUES

part |2 pages

SECTION III: IMPLEMENTING PKI

chapter 18|12 pages

IMPLEMENTATION AND DEPLOYMENT

chapter 19|8 pages

IMPLEMENTATION COSTS

chapter 20|12 pages

PKI PERFORMANCE

part |2 pages

SECTION IV: MANAGING PKI

part |2 pages

SECTION V: APPENDICES