| Chapter Summary (See related pages)
- PKIs form the central management functionality used to enable encryption technologies.
- PKI solutions include Certificate Authorities (CA) and Registration Authorities (RA).
- RAs verify identities to be used on certificates.
- CAs create certificates for identified entities and maintain records of their issuance and revocation.
- Certificates are handled via a certificate server and client software.
- Three classes of certificates exist
- Class 1 personal e-mail use
- Class 2 software signing
- Class 3 used to set up a CA
- There are three different architectures of CAs: hierarchical, peer-to-peer, and hybrid.
|
|