Abstract
A major task of a PKI is to provide authenticity proofs for public keys. Important tools that are used in such proofs are certificates. In this chapter we explain the concept of a certificate and the main certificate standards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer, OpenPGP message format, in IETF Request for Comments, 4880, Nov 2007
Certificate Status and Revocation Checking, http://social.technet.microsoft.com/wiki/contents/articles/certificate-status-and-revocation-checking.aspx
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 5280, May 2008
Comité Européen de Normalisation (CEN), Application interface for smart cards used as secure signature creation devices—part 1: basic requirements. CEN Workshop Agreement (2004), ftp://ftp.cenorm.be/PUBLIC/CWAs/e-Europe/eSign/cwa14890-01-2004-Mar.pdf
O. Dubuisson, ASN.1—Communication Between Heterogeneous Systems (Morgan Kaufmann, San Diego, 2000)
C. Ellison, SPKI requirements, in IETF Request for Comments, 2692, Sept 1999
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, SPKI certificate theory, in IETF Request for Comments, 2693, Sept 1999
S. Farrell, R. Housley, An internet attribute certificate profile for authorization, in IETF Request for Comments, 3281, Apr 2002
International Organization for Standardization (ISO), English country names and code elements, http://www.iso.org/iso/english_country_names_and_code_elements
International Organization for Standardization ISO, ISO/IEC 7816-8: identification cards – integrated circuit(s) cards with contacts – part 8: security related interindustry commands. International Standard, Oct 1999
International Organization for Standardization ISO, ISO/IEC 9796: information technology – security techniques – digital signature schemes giving message recovery – parts 1–3. International Standard, 1999–2002
J. Paajarvi, XML encoding of SPKI certificates (2000), http://xml.coverpages.org/draft-paajarvi-xml-spki-cert-00.txt
S. Park, H. Park, Y. Won, J. Lee, S. Kent, Traceable anonymous certificate, in IETF Request for Comments, 5636, Aug 2009
W. Polk, R. Housley, L. Bassham, Algorithms and identifiers for the internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 3279, Apr 2002
Recommendation X.680 ITU-T, Information technology – abstract syntax notation one (ASN.1): specification of basic notation, July 2002
Recommendation X.690 ITU-T, Information technology – ASN.1 encoding rules: specification of basic encoding rules (BER), canonical encoding rules (CER) and distinguished encoding rules (DER), July 2002
Recommendation X.509 ITU-T, Information technology – open systems interconnection – the directory: public-key and attribute certificate frameworks, Aug 2005
Recommendation X.501 ITU-T, Information technology – open systems interconnection – the directory: models, Nov 2008
SPKI/SDSI Certificate Documentation, http://world.std.com/~cme/html/spki.html
WAP Forum, WAP certificate and CRL profiles specification, http://www.openmobilealliance.org/tech/affiliates/wap/wap-211-wapcert-20010522-a.pdf
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Certificates. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-40657-7_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40656-0
Online ISBN: 978-3-642-40657-7
eBook Packages: Computer ScienceComputer Science (R0)