This lecture will address Management of Asymmetric Keys and Public Key Infrastructures
Download here
Mandatory Reading
One of:
- Segurança em Redes Informáticas, A. Zúquete, Chap. 3
- Security in Computing, 5th edition, C. P. Pfleeger, S. L. Pfleeger, Chap. 2.3
Relevant References
- Public-key cryptography
- Public key certificate
- Certification authorities
- Root certificates
- Self-signed certificates
- Public key infrastructure
- PGP (Pretty Good Privacy)
- PEM (Privacy-enhanced Electronic Mail)
- A Layman’s Guide to a Subset of ASN.1, BER, and DER
- Trusted timestamping
- Qualified electronic signature