• DocumentCode
    1483544
  • Title

    Public key infrastructure. How it works

  • Author

    Younglove, Roger W.

  • Author_Institution
    NetworkCare Security Services, Southfield, MI, USA
  • Volume
    12
  • Issue
    2
  • fYear
    2001
  • fDate
    4/1/2001 12:00:00 AM
  • Firstpage
    99
  • Lastpage
    102
  • Abstract
    A variety of authentication methods to verify the identity of valid users can be implemented with IPSec (IP security), including shared secret, token cards and digital certificates. For a large extranet implementation, the easiest method is public key infrastructure (PKI) using digital certificates. This article gives telecommunications managers, network planners and engineers a more detailed look at how PKI works in a virtual private network (VPN) environment.
  • Keywords
    authorisation; certification; computer network management; public key cryptography; telecommunication security; transport protocols; IP security; IPSec; Internet Protocol; authentication methods; digital certificates; extranet implementation; network planning; public key infrastructure; shared secret; telecommunications engineering; telecommunications management; token cards; valid user identity verification; virtual private network;
  • fLanguage
    English
  • Journal_Title
    Computing & Control Engineering Journal
  • Publisher
    iet
  • ISSN
    0956-3385
  • Type

    jour

  • DOI
    10.1049/cce:20010211
  • Filename
    920643