Advertisement

Certificates and Public Key Cryptography

  • David Basin
  • Patrick Schaller
  • Michael Schläpfer

Abstract

We concluded the previous chapter by describing the standard way of enabling HTTPS on an Apache web server. Our main goal was to protect the information exchanged between clients and the server from adversaries eavesdropping on communication. In this chapter, we will brush up on public key cryptography and examine its use in more detail.

Keywords

Signing Request Symmetric Cryptography Asymmetric Cryptography Revocation List Client Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • David Basin
    • 1
  • Patrick Schaller
    • 1
  • Michael Schläpfer
    • 1
  1. 1.ETH ZurichZurichSwitzerland

Personalised recommendations