Introduction to Public Key Infrastructures

Overview

The introduction of public key cryptography (PKC) was a critical advance in the development of the Internet as it enabled secure communication over open networks between entities without prior contact. This represented a tremendous advance on the symmetric key approach, but beyond this PKC also enables techniques that have no analogue in traditional cryptography, most importantly digital signatures such as those used to authenticate software downloads and updates. Although PKC does not rely on the exchange of ...

See more details below
Hardcover (2013)
$57.97
BN.com price
(Save 17%)$69.99 List Price
Other sellers (Hardcover)
  • All (7) from $53.16   
  • New (5) from $53.16   
  • Used (2) from $57.85   
Sending request ...

Overview

The introduction of public key cryptography (PKC) was a critical advance in the development of the Internet as it enabled secure communication over open networks between entities without prior contact. This represented a tremendous advance on the symmetric key approach, but beyond this PKC also enables techniques that have no analogue in traditional cryptography, most importantly digital signatures such as those used to authenticate software downloads and updates. Although PKC does not rely on the exchange of secret keys, pairs of private and public keys are used and proper key management is of vital importance: we must keep private keys private, and we must guarantee their authenticity. So it is not sufficient to study only the ingenious underlying mathematical mechanisms, we must understand the so-called public key infrastructures (PKIs) used to manage key pairs.

In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI.

This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Read More Show Less

Product Details

  • ISBN-13: 9783642406560
  • Publisher: Springer Berlin Heidelberg
  • Publication date: 11/30/2013
  • Edition description: 2013
  • Pages: 194
  • Sales rank: 1,084,977
  • Product dimensions: 6.14 (w) x 9.21 (h) x 0.50 (d)

Meet the Author

Johannes A. Buchmann has been a Professor of Computer Science and Mathematics at the Technische Universität Darmstadt since 1996. He received his PhD in Mathematics from the Universität zu Köln in 1982, and his Habilitation in Mathematics from the Universität Düsseldorf in 1988. He was a Professor of Computer Science at the Universität des Saarlandes from 1988 to 1996. Among many awards he received a Feodor Lynen Fellowship from the Alexander von Humboldt Foundation, the Leibniz Award of the German Science Foundation (Deutsche Forschungsgemeinschaft), the Karl Heinz Beckurts Prize, and the IT Security Prize of the Horst Görtz Foundation. He has advised companies such as Siemens, Hitachi, Sony, NTT, Schenck, Microsoft, and Lufthansa, and the BSI, the German Federal Office for Information Security. He is a member of the German Academy of Sciences and Literature, Mainz; the German National Academy of Sciences, Leopoldina; Acatech, the German Academy of Science and Engineering, Munich; and the Berlin-Brandenburg Academy of Sciences and Humanities, Berlin. He has chaired related cryptology conferences and was a board member of the Journal of Cryptology from 1990 to 2009. Among his key book publications are the textbook "Introduction to Cryptography" (Springer, 2004, 2nd ed.), and he has supervised 57 Ph.D. students and lectured on information security, cryptology, and related mathematical methods.

Evangelis Karatsiolis obtained his PhD in 2007 from the Technische Universität Darmstadt for his thesis "Flexible Certificate Management in Public Key Infrastructures"; he works for FlexSecure GmbH in Darmstadt.

Alexander Wiesmaier obtained his PhD in 2008 from the Technische Universität Darmstadt for his thesis "Secure Private Key Management in Adaptable Public Key Infrastructures". He is a lead security architect at AGT Group (R&D) GmbH in Darmstadt, working on critical infrastructure protection, safety, and security.

Read More Show Less

Table of Contents

Chap. 1 The Purpose of PKI.- Chap. 2 Certificates.- Chap. 3 Trust Models.- Chap. 4 Private Keys.- Chap. 5Revocation.- Chap. 6 Validity Models.- Chap. 7 Certification Service Provider.- Chap. 8 Certificate Policies.- Chap. 9 Certification Paths: Retrieval and Validation.- Chap. 10 PKI in Practice.- App. A A Basic Path Validation Algorithm.- App. B Exercise Solutions.- Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)