Summary

This chapter has looked briefly at a number of standards activities that have particular relevance to PKI for one of the following reasons:

  • They define and formalize PKI concepts.

  • They specify certificate formats and processing rules.

  • They make particular use of certificates to accomplish security functions (such as authenticity, integrity, and confidentiality).

Much of this activity is taking place within the various working groups of the IETF, highlighting its importance in the area of security and PKI.

The list of activities provided within this chapter is not meant to be exhaustive, but it does attempt to highlight some of the most important and most visible activities. These activities differ in terms of their approach (that is, how ...

Get Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.