Skip to main content

Private Keys

  • Chapter
  • First Online:
Introduction to Public Key Infrastructures

Abstract

In the previous chapters we have seen how certificates and trust models can be used to authenticate public keys. A further task of public key infrastructures is to support the users in keeping their private keys secret. In this chapter we show how this can be achieved. We introduce a private key life cycle model and discuss software- and hardware-based solutions for storing and protecting private keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. Di Crescenzo, N. Ferguson, R. Impagliazzo, M. Jakobsson, How to forget a secret, in Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science (STACS’99), Trier, ed. by C. Meinel, S. Tison. Number 1563 in Lecture Notes in Computer Science (LNCS). (Springer, Berlin/Heidelberg, 1999), pp. 500–509

    Google Scholar 

  2. DT, FHG, SIT, TÃœV, TELETRUST, CT-API 1.1, Application independent CardTerminal application programming interface for ICC applications (2002), http://www.tuvit.de/cps/rde/xbcr/tuevit_de/CTAPI11EN.pdf

  3. P. Gutmann, PFX – How not to design a crypto protocol/standard, http://www.cs.auckland.ac.nz/~pgut001/pubs/pfx.html

  4. P. Gutmann, Secure deletion of data from magnetic and solid-state memory, in Proceedings of the 6th USENIX Security Symposium, San Jose, July 1996

    Google Scholar 

  5. NIST, FIPS standards, http://csrc.nist.gov/publications/PubsFIPS.html

  6. PCSC Workgroup, PC/SC specification, http://www.pcscworkgroup.com/

  7. RSA Laboratories, PKCS #8 v1.2: private-key information syntax standard (1993), http://www.rsa.com/rsalabs/node.asp?id=2130

  8. RSA Laboratories, PKCS #12 v1.0: personal information exchange syntax (1999), http://www.rsa.com/rsalabs/node.asp?id=2138

  9. RSA Laboratories, PKCS #11 v2.20: cryptographic token interface standard (2004), http://www.rsa.com/rsalabs/node.asp?id=2133

  10. A. Wiesmaier, Secure private key management in adaptable public key infrastructures. Ph.D. thesis, Cryptography and Computer Algebra Group, Technische Universität Darmstadt. (Mensch und Buch Verlag, Berlin, 2009). ISBN-13: 978-3-86664-646-9

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Private Keys. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40657-7_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40656-0

  • Online ISBN: 978-3-642-40657-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics