Skip to main content

PKI in Practice

  • Chapter
  • First Online:
Introduction to Public Key Infrastructures

Abstract

In this chapter we present applications that use public key cryptography and PKIs. In these applications both PGP- and X.509-based infrastructures can be used. While X.509 is mostly used in commercial applications, PGP is popular in the private sector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer, OpenPGP message format, in IETF Request for Comments, 4880, Nov 2007

    Google Scholar 

  2. D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 5280, May 2008

    Google Scholar 

  3. Department for Work and Pensions: Government Gateway, http://www.gateway.gov.uk/

  4. T. Dierks, E. Rescorla, The transport layer security (TLS) protocol version 1.1, in IETF Request for Comments, 4346, Apr 2006

    Google Scholar 

  5. T. Dierks, E. Rescorla, The transport layer security (TLS) protocol version 1.2, in IETF Request for Comments, 5246, Aug 2008

    Google Scholar 

  6. M. Elkins, D. Del Torto, R. Levien, T. Roessler, MIME security with OpenPGP, in IETF Request for Comments, 3156, Aug 2001

    Google Scholar 

  7. EnigMail project, http://whttp://www.enigmail.net

  8. eSignatures Legal Wiki, http://www.esignaturelegalwiki.org

  9. European Parliament and Council, Directive 1999/93/EC of the European Parliament and of the Council of 13 Dec 1999 on a Community framework for electronic signatures, Dec 1999

    Google Scholar 

  10. P. Ford-Hutchinson, Securing FTP with TLS, in IETF Request for Comments, 4217, Oct 2005

    Google Scholar 

  11. A. Freier, P. Karlton, P. Kocher, The secure sockets layer (SSL) protocol version 3.0, in IETF Request for Comments, 6101, Aug 2011

    Google Scholar 

  12. GNU Privacy Guard, http://www.gnupg.org/

  13. R. Harrison, Lightweight directory access protocol (LDAP): authentication methods and security mechanisms, in IETF Request for Comments, 4513, June 2006

    Google Scholar 

  14. P. Hoffman, SMTP service extension for secure SMTP over transport layer security, in IETF Request for Comments, 3207, Feb 2002

    Google Scholar 

  15. S. Kent, K. Seo, Security architecture for the internet protocol, in IETF Request for Comments, 4301, Dec 2005

    Google Scholar 

  16. H. Krawczyk, M. Bellare, R. Canetti, HMAC: keyed-hashing for message authentication, in IETF Request for Comments, 2104, Feb 1997

    Google Scholar 

  17. C. Newman, Using TLS with IMAP, POP3 and ACAP, in IETF Request for Comments, 2595, June 1999

    Google Scholar 

  18. ORACLE, Java Web Start Technology, http://www.oracle.com/technetwork/java/javase/javawebstart/index.html

  19. B. Ramsdell, S. Turner, Secure/multipurpose internet mail extensions (S/MIME) version 3.2 certificate handling, in IETF Request for Comments, 5750, Jan 2010

    Google Scholar 

  20. B. Ramsdell, S. Turner, Secure/multipurpose internet mail extensions (S/MIME) version 3.2 message specification, in IETF Request for Comments, 5751, Jan 2010

    Google Scholar 

  21. E. Rescorla, M. Ray, S. Dispensa, N. Oskov, Transport layer security (TLS) renegotiation indication extension, in IETF Request for Comments, 5746, Feb 2010

    Google Scholar 

  22. SimplySign, SimplySign, http://www.simplysign.co.uk/

  23. T. Ylonen, C. Lonvick, The secure shell (SSH) protocol architecture, in IETF Request for Comments, 4251, Jan 2006

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). PKI in Practice. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40657-7_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40656-0

  • Online ISBN: 978-3-642-40657-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics