DeviceMaster LT User Guide: 2000586 Rev. B
DeviceMaster LT Security - 49
Understanding Security Methods and Terminology
Who Provides
the
Infrastructure?
A number of products are offered that enable a company or group of companies
to implement a PKI. The acceleration of e-commerce and business-to-business
commerce over the Internet has increased the demand for PKI solutions.
Related ideas are the virtual private network (VPN) and the IP Security
(IPsec) standard. Among PKI leaders are:
• RSA, which has developed the main algorithms used by PKI vendors.
• Verisign, which acts as a certificate auth
ority and sells software that
allows a company to create its own certificate authorities.
• GTE CyberTrust, which provides a P
KI implementation methodology and
consultation service that it plans to vend to other companies for a fixed
pri
ce.
• Xcert, whose Web Sentry product that c
hecks the revocation status of
certificat
es on a server, using the Online Certificate Status Protocol
(OCSP).
• Netscape, whose Directory Server produ
ct is said to support 50 million
objects and process 5,000 queries a second; Secure E-Commerce, which
allows a company or extranet manager to manage digital certificates; and
Meta-Directory, which can connect all corporate directories
into a single
directory for security man
agement.
The following topic references are from: http://searchsecurity.techtarget.com/
• PKI (public key infrastructure)
• How Public/Private Key Cryptography Works
• Who Provides the Infrastructure
• Digital Certificate
•DH Key
• Man in the Middle attack
The RSA Key pair topic reference is from: http://en.wikipedia.org/wiki/RSA
Term or
Issue
Explanation