|
|
1 | (20) |
|
|
1 | (1) |
|
|
2 | (3) |
|
|
2 | (1) |
|
|
3 | (1) |
|
1.2.3 Entity Authentication |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
1.2.6 Other Security Goals |
|
|
5 | (1) |
|
|
5 | (10) |
|
1.3.1 Secret Key Encryption |
|
|
5 | (2) |
|
1.3.2 Public Key Encryption |
|
|
7 | (1) |
|
1.3.3 The RSA Public Key Cryptosystem |
|
|
8 | (1) |
|
1.3.4 Other Public Key Cryptosystems |
|
|
9 | (1) |
|
|
10 | (1) |
|
1.3.6 Cryptographic Hash Functions and Message Authentication Codes |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.3.8 The RSA Signature Scheme |
|
|
13 | (1) |
|
1.3.9 Other Digital Signature Schemes |
|
|
14 | (1) |
|
1.4 Why Public Key Infrastructure? |
|
|
15 | (1) |
|
1.5 Identity-Based Public Key Cryptography |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (4) |
|
|
18 | (3) |
|
|
21 | (18) |
|
2.1 The Concept of a Certificate |
|
|
21 | (1) |
|
|
22 | (5) |
|
|
22 | (2) |
|
|
24 | (3) |
|
|
27 | (1) |
|
|
27 | (1) |
|
2.3 X.509 Certificate Extensions |
|
|
27 | (4) |
|
2.4 Attribute Certificates |
|
|
31 | (1) |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
33 | (2) |
|
|
34 | (1) |
|
|
34 | (1) |
|
2.7.3 Traceable Anonymous Certificate |
|
|
35 | (1) |
|
|
35 | (4) |
|
|
37 | (2) |
|
|
39 | (22) |
|
|
39 | (3) |
|
|
42 | (6) |
|
|
44 | (3) |
|
|
47 | (1) |
|
3.2.3 Probabilistic Trust Model for GnuPG |
|
|
48 | (1) |
|
|
48 | (3) |
|
|
50 | (1) |
|
3.4 Combining Trust Hierarchies |
|
|
51 | (7) |
|
|
52 | (1) |
|
|
53 | (3) |
|
3.4.3 Cross-Certification |
|
|
56 | (1) |
|
|
56 | (2) |
|
|
58 | (3) |
|
|
60 | (1) |
|
|
61 | (14) |
|
4.1 Private Key Life Cycle |
|
|
61 | (1) |
|
4.2 Personal Security Environments |
|
|
62 | (1) |
|
|
63 | (5) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
4.3.4 Application-Specific Formats |
|
|
65 | (3) |
|
|
68 | (5) |
|
|
68 | (1) |
|
|
69 | (1) |
|
4.4.3 Smart Card Communication Interfaces |
|
|
70 | (2) |
|
4.4.4 Hardware Security Module |
|
|
72 | (1) |
|
|
73 | (2) |
|
|
73 | (2) |
|
|
75 | (20) |
|
|
75 | (1) |
|
5.2 Certificate Revocation Lists |
|
|
76 | (7) |
|
|
76 | (3) |
|
|
79 | (2) |
|
5.2.3 Issuing Time of a CRL |
|
|
81 | (1) |
|
|
82 | (1) |
|
5.2.5 Authority Revocation List |
|
|
83 | (1) |
|
|
83 | (1) |
|
5.3 Certificate Extensions Related to Revocation |
|
|
83 | (1) |
|
5.3.1 CRL Distribution Points |
|
|
83 | (1) |
|
|
84 | (5) |
|
|
84 | (2) |
|
|
86 | (3) |
|
|
89 | (1) |
|
5.4.4 Design of an OCSP Server |
|
|
89 | (1) |
|
5.5 Other Revocation Mechanisms |
|
|
89 | (1) |
|
|
89 | (1) |
|
5.5.2 Short-Lived Certificates |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (4) |
|
|
94 | (1) |
|
|
95 | (8) |
|
|
95 | (2) |
|
|
97 | (1) |
|
6.3 The Modified Shell Model |
|
|
98 | (2) |
|
|
100 | (3) |
|
|
101 | (2) |
|
7 Certification Service Provider |
|
|
103 | (14) |
|
7.1 Certificate Life Cycle |
|
|
103 | (2) |
|
7.1.1 Certificate Generation Phase |
|
|
103 | (1) |
|
7.1.2 Certificate Validity Phase |
|
|
104 | (1) |
|
7.1.3 Certificate Invalidity Phase |
|
|
104 | (1) |
|
7.2 Registration Authority |
|
|
105 | (2) |
|
7.3 Certification Authority |
|
|
107 | (1) |
|
|
108 | (1) |
|
7.5 Communication Within CSPs |
|
|
108 | (7) |
|
7.5.1 Cryptographic Protection of Messages |
|
|
108 | (1) |
|
7.5.2 Certificate Requests |
|
|
109 | (3) |
|
7.5.3 Complex Message Formats and Protocols |
|
|
112 | (3) |
|
|
115 | (2) |
|
|
115 | (2) |
|
|
117 | (8) |
|
8.1 Structure of Certificate Policies |
|
|
117 | (2) |
|
8.1.1 Certification Practice Statement |
|
|
119 | (1) |
|
8.2 Relevant Certificate Extensions |
|
|
119 | (3) |
|
8.2.1 Certificate Policies |
|
|
119 | (1) |
|
|
119 | (2) |
|
|
121 | (1) |
|
|
121 | (1) |
|
8.3 Extended Validation Certificates |
|
|
122 | (1) |
|
|
122 | (3) |
|
|
123 | (2) |
|
9 Certification Paths: Retrieval and Validation |
|
|
125 | (18) |
|
|
125 | (6) |
|
9.1.1 Storing Certificates |
|
|
126 | (3) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
9.2 Other Certificate Retrieval Methods |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
9.2.3 Web Servers and FTP Servers |
|
|
132 | (1) |
|
|
132 | (1) |
|
9.3 Certification Path Building |
|
|
132 | (2) |
|
9.4 Certification Path Validation |
|
|
134 | (3) |
|
9.4.1 Validation Algorithm |
|
|
135 | (2) |
|
9.5 Server-Based Certificate Validation Protocol (SCVP) |
|
|
137 | (1) |
|
9.6 Relevant Certificate Extensions |
|
|
138 | (2) |
|
9.6.1 Authority Information Access |
|
|
138 | (1) |
|
9.6.2 Subject Information Access |
|
|
139 | (1) |
|
|
140 | (3) |
|
|
141 | (2) |
|
|
143 | (22) |
|
|
143 | (1) |
|
|
144 | (8) |
|
|
145 | (2) |
|
|
147 | (5) |
|
|
152 | (2) |
|
|
154 | (2) |
|
10.5 Legally Binding Electronic Signatures |
|
|
156 | (3) |
|
|
159 | (3) |
|
|
162 | (3) |
|
|
163 | (2) |
A Basic Path Validation Algorithm |
|
165 | (8) |
Solutions to the Exercises |
|
173 | (14) |
Index |
|
187 | |