Abstract
In this chapter we present applications that use public key cryptography and PKIs. In these applications both PGP- and X.509-based infrastructures can be used. While X.509 is mostly used in commercial applications, PGP is popular in the private sector.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer, OpenPGP message format, in IETF Request for Comments, 4880, Nov 2007
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 5280, May 2008
Department for Work and Pensions: Government Gateway, http://www.gateway.gov.uk/
T. Dierks, E. Rescorla, The transport layer security (TLS) protocol version 1.1, in IETF Request for Comments, 4346, Apr 2006
T. Dierks, E. Rescorla, The transport layer security (TLS) protocol version 1.2, in IETF Request for Comments, 5246, Aug 2008
M. Elkins, D. Del Torto, R. Levien, T. Roessler, MIME security with OpenPGP, in IETF Request for Comments, 3156, Aug 2001
EnigMail project, http://whttp://www.enigmail.net
eSignatures Legal Wiki, http://www.esignaturelegalwiki.org
European Parliament and Council, Directive 1999/93/EC of the European Parliament and of the Council of 13 Dec 1999 on a Community framework for electronic signatures, Dec 1999
P. Ford-Hutchinson, Securing FTP with TLS, in IETF Request for Comments, 4217, Oct 2005
A. Freier, P. Karlton, P. Kocher, The secure sockets layer (SSL) protocol version 3.0, in IETF Request for Comments, 6101, Aug 2011
GNU Privacy Guard, http://www.gnupg.org/
R. Harrison, Lightweight directory access protocol (LDAP): authentication methods and security mechanisms, in IETF Request for Comments, 4513, June 2006
P. Hoffman, SMTP service extension for secure SMTP over transport layer security, in IETF Request for Comments, 3207, Feb 2002
S. Kent, K. Seo, Security architecture for the internet protocol, in IETF Request for Comments, 4301, Dec 2005
H. Krawczyk, M. Bellare, R. Canetti, HMAC: keyed-hashing for message authentication, in IETF Request for Comments, 2104, Feb 1997
C. Newman, Using TLS with IMAP, POP3 and ACAP, in IETF Request for Comments, 2595, June 1999
ORACLE, Java Web Start Technology, http://www.oracle.com/technetwork/java/javase/javawebstart/index.html
B. Ramsdell, S. Turner, Secure/multipurpose internet mail extensions (S/MIME) version 3.2 certificate handling, in IETF Request for Comments, 5750, Jan 2010
B. Ramsdell, S. Turner, Secure/multipurpose internet mail extensions (S/MIME) version 3.2 message specification, in IETF Request for Comments, 5751, Jan 2010
E. Rescorla, M. Ray, S. Dispensa, N. Oskov, Transport layer security (TLS) renegotiation indication extension, in IETF Request for Comments, 5746, Feb 2010
SimplySign, SimplySign, http://www.simplysign.co.uk/
T. Ylonen, C. Lonvick, The secure shell (SSH) protocol architecture, in IETF Request for Comments, 4251, Jan 2006
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). PKI in Practice. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-40657-7_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40656-0
Online ISBN: 978-3-642-40657-7
eBook Packages: Computer ScienceComputer Science (R0)