2. Public key cryptography
2.1 Certification techniques
Cryptographic techniques are used to ensure trust in dematerialized exchanges and, in particular, commerce (in the broadest sense) on the Internet. Among these, public key cryptography is essential. Here are just a few of the techniques used
data encryption and decryption using secret and/or public key techniques;
the technique for creating condensed information using hash operations;...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Public key cryptography
Bibliography
References
Standards and norms
- Information Technology – Open systems interconnection – The directory: general framework for public key and attribute certificates - ITU Rec. X.509 - 2016
- Information technology – Open Systems Interconnection – The Directory – Part 8: Public-key and attribute certificate frameworks - ISO/IEC 9594-8 - 2-2017
- Secure Hash Standard (SHS) - FIPS PUB 180 - 4(2015)
- Data Encryption Standard (DES) - FIPS...
Regulations
Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures (OJ L. 13, 19 January 2000, pp. 12-20).
Law no. 2000-230 of March 13, 2000 adapting the law of evidence to information technologies and relating to electronic signatures (JO no. 62 of March 14, 2000). Replaced by Ordinance n° 2016-131.
Decree...
Organizations
Internet Engineering Task Force
Virtual Private Network Consortium (VPNC)
French Ministry of the Economy, Finance and Industry
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference