DocumentCode :
1273573
Title :
An overview of PKI trust models
Author :
Perlman, Radio
Volume :
13
Issue :
6
fYear :
1999
Firstpage :
38
Lastpage :
43
Abstract :
If Alice and Bob each know their own private key and the other´s public key, they can communicate securely, through any number of public key based protocols such as IPSec, PGP, S/MIME, or SSL. However, how do they know each other´s public keys? The goal of a public key infrastructure (PKI) is to enable secure, convenient, and efficient discovery of public keys. It should be applicable within as well as between organizations, and scalable to support the Internet. There are various types of PKI that are widely deployed or have been proposed. They differ in the configuration information required, trust rules, and flexibility. There are standards such as X.509 and PKIX, but these are sufficiently flexible so that almost any model of PKI can be supported. We describe several types of PKI and discuss the advantages and disadvantages of each. We argue against several popular and widely deployed models as being insecure, unscalable, or overly inconvenient. We also recommend a particular model
Keywords :
Internet; protocols; public key cryptography; telecommunication security; telecommunication standards; IPSec; Internet; PGP; PKI trust models; PKIX; S/MIME; SSL; X.509; configuration information; flexibility; insecure models; private key; public key based protocols; public key infrastructure; standards; trust rules; unscalable models; Cats; Certification; Computer aided instruction; Content addressable storage; Humans; Internet; Public key; Security; Sun; TV;
fLanguage :
English
Journal_Title :
Network, IEEE
Publisher :
ieee
ISSN :
0890-8044
Type :
jour
DOI :
10.1109/65.806987
Filename :
806987
Link To Document :
بازگشت