This lecture will address Management of Asymmetric Keys and Public Key Infrastructures
Download here
Recommended reading
- Segurança em Redes Informáticas, A. Zúquete: Chap. 3
Interesting links
- Public-key cryptography
- Public key certificate
- Certification authorities
- Root certificates
- Self-signed certificates
- Public key infrastructure
- PGP (Pretty Good Privacy)
- PEM (Privacy-enhanced Electronic Mail)
- A Layman’s Guide to a Subset of ASN.1, BER, and DER
- Trusted timestamping
- Qualified electronic signature