Chapter 7. Key and Certificate Management

As discussed in Chapter 2, "Public-Key Cryptography," asymmetric cryptography is based on the use of public/private key pairs. A public key is typically distributed in the form of a certificate, whereas a private key is a separate and distinct data structure always protected from unauthorized disclosure (either in transit, in use, or in storage). The term key/certificate life cycle management denotes the life cycle management functions associated with the creation, issuance, and subsequent cancellation of public/private key pairs and their associated certificates.

Note

The key/certificate life cycle management functions are considered separate and distinct from the actual usage of the public/private ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.