Mechanisms Required to Create PKI-Enabled Services

A number of mechanisms are required to create the PKI-enabled services discussed in this chapter. Some of the most important mechanisms are discussed in the following subsections.

Digital Signatures, Hashes, MACs, and Ciphers

Secure communication, because it relies on the core PKI services, requires the mechanisms that make the core services possible. These include digital signatures, cryptographic hash functions, MAC algorithms, and symmetric block ciphers. See Chapter 2, "Public-Key Cryptography," for a discussion of such mechanisms.

Trusted Time Sources

Secure time stamping can be implemented in such a way that it requires the presence of one or more trusted time sources for the environment. ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.