Abstract
In the previous chapters we have seen how certificates and trust models can be used to authenticate public keys. A further task of public key infrastructures is to support the users in keeping their private keys secret. In this chapter we show how this can be achieved. We introduce a private key life cycle model and discuss software- and hardware-based solutions for storing and protecting private keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
G. Di Crescenzo, N. Ferguson, R. Impagliazzo, M. Jakobsson, How to forget a secret, in Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science (STACS’99), Trier, ed. by C. Meinel, S. Tison. Number 1563 in Lecture Notes in Computer Science (LNCS). (Springer, Berlin/Heidelberg, 1999), pp. 500–509
DT, FHG, SIT, TÃœV, TELETRUST, CT-API 1.1, Application independent CardTerminal application programming interface for ICC applications (2002), http://www.tuvit.de/cps/rde/xbcr/tuevit_de/CTAPI11EN.pdf
P. Gutmann, PFX – How not to design a crypto protocol/standard, http://www.cs.auckland.ac.nz/~pgut001/pubs/pfx.html
P. Gutmann, Secure deletion of data from magnetic and solid-state memory, in Proceedings of the 6th USENIX Security Symposium, San Jose, July 1996
NIST, FIPS standards, http://csrc.nist.gov/publications/PubsFIPS.html
PCSC Workgroup, PC/SC specification, http://www.pcscworkgroup.com/
RSA Laboratories, PKCS #8 v1.2: private-key information syntax standard (1993), http://www.rsa.com/rsalabs/node.asp?id=2130
RSA Laboratories, PKCS #12 v1.0: personal information exchange syntax (1999), http://www.rsa.com/rsalabs/node.asp?id=2138
RSA Laboratories, PKCS #11 v2.20: cryptographic token interface standard (2004), http://www.rsa.com/rsalabs/node.asp?id=2133
A. Wiesmaier, Secure private key management in adaptable public key infrastructures. Ph.D. thesis, Cryptography and Computer Algebra Group, Technische Universität Darmstadt. (Mensch und Buch Verlag, Berlin, 2009). ISBN-13: 978-3-86664-646-9
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Private Keys. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-40657-7_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40656-0
Online ISBN: 978-3-642-40657-7
eBook Packages: Computer ScienceComputer Science (R0)