Management of Asymmetric Keys
Asymmetric keys provide easy access to an important set of cryptografic features, mostly related with authentication and integrity, while facilitanting key distribution. Still, reliabile distribution of up to date keys with the target stakeholders, requires an additional layer of mechanisms. This lecture will address how public keys can be distributed, the role of X509, and the structure that provides trust to everyday transactions.
- Security in Computing, Charles P. Pfleeger, Shari Lawrence Pfleeger, Third Edition, chap 2, Sec. 8.
- You can use your University email with SSO to access this resource
- Segurança em Redes Informáticas, A. Zúquete, Chap. 3
Relevant web resources
- NIST Special Publication 800-57: Recommendation for Key Management – Part 1: General (Revision 5)
- Public-key cryptography
- Public key certificate
- Certification authorities
- Root certificates
- Self-signed certificates
- Public key infrastructure
- PGP (Pretty Good Privacy)
- PEM (Privacy-enhanced Electronic Mail)