Comtrol DeviceMaster LT User Manual page 49

Table of Contents

Advertisement

Term or
Issue
Who Provides
the
Infrastructure?
The following topic references are from: http://searchsecurity.techtarget.com/
PKI (public key infrastructure)
How Public/Private Key Cryptography Works
Who Provides the Infrastructure
Digital Certificate
DH Key
Man in the Middle attack
The RSA Key pair topic reference is from:
DeviceMaster LT User Guide: 2000586 Rev. B
A number of products are offered that enable a company or group of companies
to implement a PKI. The acceleration of e-commerce and business-to-business
commerce over the Internet has increased the demand for PKI solutions.
Related ideas are the virtual private network (VPN) and the IP Security
(IPsec) standard. Among PKI leaders are:
RSA, which has developed the main algorithms used by PKI vendors.
Verisign, which acts as a certificate authority and sells software that
allows a company to create its own certificate authorities.
GTE CyberTrust, which provides a PKI implementation methodology and
consultation service that it plans to vend to other companies for a fixed
price.
Xcert, whose Web Sentry product that checks the revocation status of
certificates on a server, using the Online Certificate Status Protocol
(OCSP).
Netscape, whose Directory Server product is said to support 50 million
objects and process 5,000 queries a second; Secure E-Commerce, which
allows a company or extranet manager to manage digital certificates; and
Meta-Directory, which can connect all corporate directories into a single
directory for security management.
Understanding Security Methods and Terminology
Explanation
http://en.wikipedia.org/wiki/RSA
DeviceMaster LT Security - 49

Advertisement

Table of Contents
loading

Table of Contents