Skip to main content

Certificates

  • Chapter
  • First Online:
Introduction to Public Key Infrastructures

Abstract

A major task of a PKI is to provide authenticity proofs for public keys. Important tools that are used in such proofs are certificates. In this chapter we explain the concept of a certificate and the main certificate standards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Callas, L. Donnerhacke, H. Finney, D. Shaw, R. Thayer, OpenPGP message format, in IETF Request for Comments, 4880, Nov 2007

    Google Scholar 

  2. Certificate Status and Revocation Checking, http://social.technet.microsoft.com/wiki/contents/articles/certificate-status-and-revocation-checking.aspx

  3. D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, W. Polk, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 5280, May 2008

    Google Scholar 

  4. Comité Européen de Normalisation (CEN), Application interface for smart cards used as secure signature creation devices—part 1: basic requirements. CEN Workshop Agreement (2004), ftp://ftp.cenorm.be/PUBLIC/CWAs/e-Europe/eSign/cwa14890-01-2004-Mar.pdf

  5. O. Dubuisson, ASN.1—Communication Between Heterogeneous Systems (Morgan Kaufmann, San Diego, 2000)

    Google Scholar 

  6. C. Ellison, SPKI requirements, in IETF Request for Comments, 2692, Sept 1999

    Google Scholar 

  7. C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, SPKI certificate theory, in IETF Request for Comments, 2693, Sept 1999

    Google Scholar 

  8. S. Farrell, R. Housley, An internet attribute certificate profile for authorization, in IETF Request for Comments, 3281, Apr 2002

    Google Scholar 

  9. International Organization for Standardization (ISO), English country names and code elements, http://www.iso.org/iso/english_country_names_and_code_elements

  10. International Organization for Standardization ISO, ISO/IEC 7816-8: identification cards – integrated circuit(s) cards with contacts – part 8: security related interindustry commands. International Standard, Oct 1999

    Google Scholar 

  11. International Organization for Standardization ISO, ISO/IEC 9796: information technology – security techniques – digital signature schemes giving message recovery – parts 1–3. International Standard, 1999–2002

    Google Scholar 

  12. J. Paajarvi, XML encoding of SPKI certificates (2000), http://xml.coverpages.org/draft-paajarvi-xml-spki-cert-00.txt

  13. S. Park, H. Park, Y. Won, J. Lee, S. Kent, Traceable anonymous certificate, in IETF Request for Comments, 5636, Aug 2009

    Google Scholar 

  14. W. Polk, R. Housley, L. Bassham, Algorithms and identifiers for the internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, in IETF Request for Comments, 3279, Apr 2002

    Google Scholar 

  15. Recommendation X.680 ITU-T, Information technology – abstract syntax notation one (ASN.1): specification of basic notation, July 2002

    Google Scholar 

  16. Recommendation X.690 ITU-T, Information technology – ASN.1 encoding rules: specification of basic encoding rules (BER), canonical encoding rules (CER) and distinguished encoding rules (DER), July 2002

    Google Scholar 

  17. Recommendation X.509 ITU-T, Information technology – open systems interconnection – the directory: public-key and attribute certificate frameworks, Aug 2005

    Google Scholar 

  18. Recommendation X.501 ITU-T, Information technology – open systems interconnection – the directory: models, Nov 2008

    Google Scholar 

  19. SPKI/SDSI Certificate Documentation, http://world.std.com/~cme/html/spki.html

  20. WAP Forum, WAP certificate and CRL profiles specification, http://www.openmobilealliance.org/tech/affiliates/wap/wap-211-wapcert-20010522-a.pdf

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). Certificates. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40657-7_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40656-0

  • Online ISBN: 978-3-642-40657-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics