| 
                           
                              | 
                                       Santosh Chokhani
                                          | Chapter 23 – | Public Key Infrastructures and Certificate Authorities |  
 Chapter Contents:
 
 
 
                                       
                                          |  | 23.1 |  | Introduction |  
                                          |  | 23.1.1 |  | Secret Key Cryptography Not Practical for Network Security |  
                                          |  | 23.1.2 |  | Public Key Cryptosystem |  
                                          |  | 23.1.3 |  | Advantages of Public Key Cryptosystem over Secret Key Cryptosystem |  
                                          |  | 23.2 |  | Need for Public Key Infrastructure |  
                                          |  | 23.3 |  | Public Key Certificate |  
                                          |  | 23.4 |  | Enterprise Public Key Infrastructure |  
                                          |  | 23.5 |  | Certificate Policy |  
                                          |  | 23.6 |  | Global Public Key Infrastructure |  
                                          |  | 23.6.1 |  | Trusted Paths |  
                                          |  | 23.6.2 |  | Trust Models |  
                                          |  | 23.6.2.1 |  | Strict Hierarchy |  
                                          |  | 23.6.2.2 |  | Hierarchy |  
                                          |  | 23.6.2.3 |  | Bridge |  
                                          |  | 23.6.2.4 |  | Multiple Trust Anchors |  
                                          |  | 23.6.2.5 |  | Anarchy |  
                                          |  | 23.6.3 |  | Choosing a Public Key Infrastructure Architecture |  
                                          |  | 23.6.4 |  | Cross-Certification |  
                                          |  | 23.6.5 |  | Public Key Infrastructure Interoperability |  
                                          |  | 23.6.5.1 |  | Trust Path |  
                                          |  | 23.6.5.2 |  | Cryptographic Algorithms |  
                                          |  | 23.6.5.3 |  | Certificate and Certificate Revocation List Format |  
                                          |  | 23.6.5.4 |  | Certificate and Certificate Revocation List Dissemination |  
                                          |  | 23.6.5.5 |  | Certificate Policies |  
                                          |  | 23.6.5.6 |  | Names |  
                                          |  | 23.7. |  | Forms of Revocation |  
                                          |  | 23.7.1 |  | Types of Revocation-Notification Mechanisms |  
                                          |  | 23.7.2 |  | Certificate Revocation Lists and Their Variants |  
                                          |  | 23.7.2.1 |  | Full and Complete CRL |  
                                          |  | 23.7.2.2 |  | Authority Revocation List |  
                                          |  | 23.7.2.3 |  | Distribution-Point CRL |  
                                          |  | 23.7.2.4 |  | Delta Certificate Revocation List |  
                                          |  | 23.7.3 |  | Server-based Revocation Protocols |  
                                          |  | 23.7.4 |  | Summary of Recommendations for Revocation Notification |  
                                          |  | 23.8 |  | Rekey |  
                                          |  | 23.9 |  | Key Recovery |  
                                          |  | 23.10 |  | Privilege Management |  
                                          |  | 23.11 |  | Trusted Archival Services and Trusted Time Stamps |  
                                          |  | 23.12 |  | Cost of Public Key Infrastructure |  
                                          |  | 23.13 |  | References |  
                                          |  | 23.14 |  | Further Reading |  
                                          |  | 23.15 |  | Notes |  
 |  | 
                  
                     |  |