DeviceMaster LT User Guide
: 2000586
Rev. B
DeviceMaster LT Security - 49
Understanding Security Methods and Terminology
Who Provides
the
Infrastructure?
A number of products are offered that enable a company or group of companies
to implement a PKI. The acceleration of e-commerce and business-to-business
commerce over the Internet has increased the demand for PKI solutions.
Related ideas are the virtual private network (VPN) and the IP Security
(IPsec) standard. Among PKI leaders are:
•
RSA, which has developed the main algorithms used by PKI vendors.
•
Verisign, which acts as a certificate authority and sells software that
allows a company to create its own certificate authorities.
•
GTE CyberTrust, which provides a PKI implementation methodology and
consultation service that it plans to vend to other companies for a fixed
price.
•
Xcert, whose Web Sentry product that checks the revocation status of
certificates on a server, using the Online Certificate Status Protocol
(OCSP).
•
Netscape, whose Directory Server product is said to support 50 million
objects and process 5,000 queries a second; Secure E-Commerce, which
allows a company or extranet manager to manage digital certificates; and
Meta-Directory, which can connect all corporate directories into a single
directory for security management.
The following topic references are from:
http://searchsecurity.techtarget.com
•
PKI (public key infrastructure)
•
How Public/Private Key Cryptography Works
•
Who Provides the Infrastructure
•
Digital Certificate
•
DH Key
•
Man in the Middle attack
The RSA Key pair topic reference is from:
http://en.wikipedia.org/wiki/RSA
Term or
Issue
Explanation