Public Key Infrastructure (PKI) Jerad Bates University of Maryland, Baltimore County.

Slides:



Advertisements
Similar presentations
Keys to the Goal Setting Process
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Error Correcting Codes Stanley Ziewacz 22M:151 Spring 2009.
PowerPoint presentation to accompany Heizer/Render – Principles of Operations Management, 5e, and Operations Management, 7e © 2004 by Prentice Hall, Inc.,
Digital Systems: Principles and Applications, 10e By Ronald J. Tocci, Neal S. Widmer, and Gregory L. Moss © 2007 Pearson Education, Inc. Pearson Prentice.
Schmid: The Hospitality Manager’s Guide to Wines, Beers, and Spirits, 2nd ed. © 2008 Pearson Education, Upper Saddle River, NJ All rights reserved.
Public Key Infrastructure (PKI) Jerad Bates University of Maryland, Baltimore County December 2007.
: Distributed Systems Dr. Rajkumar Buyya Senior Lecturer and Director of MEDC Course Grid Computing and Distributed Systems (GRIDS) Laboratory Dept.
Course Syllabus  Instructor: Hsung-Pin Chang  TA: 林郁傑  Web Site:
What to presented The desing of possible MVNO for a university such as Oslo, considering below factors: Coverage of network. to increase spectrum capacity(cell.
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
Real Number System.
Network Security Chapter
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
: Distributed Systems Dr. Rajkumar Buyya Senior Lecturer and Director of MEDC Course Grid Computing and Distributed Systems (GRIDS) Laboratory Dept.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
Table of contents 1. Title Page 2. Table of Contents 3. Introduction 4. Problem Solving Teams 5. Problem Solving Teams Contd. 6. Self Managed Work Teams.
Relationship between Graph Theory and Linear Algebra By Shannon Jones.
Distributed Systems Dr. Almetwally Mohamad Mostafa
Copyright © 2003 by Pearson Education, Inc., publishing as Prentice Hall, Upper Saddle River, NJ. All rights reserved. To view maps beyond the range 41-58,
Copyright © 2003 by Pearson Education, Inc., publishing as Prentice Hall, Upper Saddle River, NJ. All rights reserved. To view maps beyond the range 59-76,
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
Issues in Distributed Multimedia Systems Joseph C. (JC) Montminy, III and James MacGlashan CMSC 621, Advanced Operating Systems Dr. Deepinder Sidhu October.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
© City University London, Dept. of Computing Distributed Systems / Distributed Systems Dr Christos Kloukinas Dept. of Computing City University London.
Transparency Masters to accompany Heizer/Render – Principles of Operations Management, 5e, and Operations Management, 7e © 2004 by Prentice Hall, Inc.,
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
UNIX Operating Systems and Kernels Presented By: Walter Haynes April 26, 2007.
Language of Music By Travis Supalla. Overview Introduction Musical Notation/Correlation to Language Music and Computers Markov Models References.
CS-495 Distributed Systems Fabián E. Bustamante, Winter 2004 Welcome to Distributed Systems.
PowerPoint presentation to accompany Heizer/Render - Principles of Operations Management, 5e, and Operations Management, 7e © 2004 by Prentice Hall, Inc.,
Discovering Hospitality and Tourism, 2nd Ed.© 2008 Pearson Education, Inc. Ninemeier and PerdueUpper Saddle River, NJ Key Players in Exhibitions.
Transparency Masters to accompany Heizer/Render – Principles of Operations Management, 5e, and Operations Management, 7e © 2004 by Prentice Hall, Inc.,
09/14/05 1 Implementing Remote Procedure Calls* Birrell, A. D. and Nelson, B. J. Presented by Emil Constantinescu *ACM Trans. Comput. Syst. 2, 1 (Feb.
Overview of Mobile File Systems Presented by Steve Todd For WSU CS 898T Mobile and Wireless Networks Class 5/3/04.
 Key Management  Secure Group Management  Authorization Management  Latest Relevant Knowledge  Future Work  References 2.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Transparency Masters to accompany Heizer/Render – Principles of Operations Management, 5e, and Operations Management, 7e © 2004 by Prentice Hall, Inc.,
Transparency Masters to accompany Heizer/Render – Principles of Operations Management, 5e, and Operations Management, 7e © 2004 by Prentice Hall, Inc.,
Distributed Systems 0. Overview Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2014/2015.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
CEN 621 Cryptography and Network Security Spring Term CEN 621 Cryptography and Network Security Spring Term INTERNATIONAL BURCH UNIVERSITY.
Instructor’s Manual with Overheads to accompany © 2008 by Prentice Hall, Inc. Making the Team: A Guide for Managers 3/e (Thompson) A Pearson Education.
SSCP: A High-Speed Introduction to the Exam Domains
Introduction to Operating Systems
Figure 15.1 System development, production/construction, operational, logistics, and maintenance support activities.
CPE741: Distributed Systems Course Introduction
CPE741: Distributed Systems Course Introduction
CPE741: Distributed Systems Course Introduction
Asynchronous Cryptology: Implementations and Applications
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
عمادة التعلم الإلكتروني والتعليم عن بعد
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Ages of students in the RN to BSN program at Ferris State University Whitney Ayers Introduction Purpose- to show the age range of students in the RN to.
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Sociological Perspectives
For these two jobs rate each of Hackman and Oldham ´s core job characteristics on a scale from 1 to 10. What is your total score? What about the job could.
Install AD Certificate Services
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
For these two jobs rate each of Hackman and Oldham ´s core job characteristics on a scale from 1 to 10. What is your total score? What about the job could.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Copyright © 2008 Pearson Prentice Hall Inc.
Copyright © 2008 Pearson Prentice Hall Inc.
Presentation transcript:

Public Key Infrastructure (PKI) Jerad Bates University of Maryland, Baltimore County

Overview Introduction Introduction Background Background Certificates Certificates Organization Organization Conclusions Conclusions

Introduction Motivation Motivation What is a PKI? What is a PKI?

Background Cryptographic tools Cryptographic tools Putting them together Putting them together A secure communication session A secure communication session

Certificates What they are What they are How they are issued How they are issued How they are distributed How they are distributed

Organization What is “Trust”? What is “Trust”? How do we organize a PKI to disseminate trust How do we organize a PKI to disseminate trust Models Models Hierarchy Hierarchy Networked Networked Web Browser Web Browser PGP PGP

Conclusions What a PKI can do What a PKI can do What a PKI can not do What a PKI can not do Issues and Limitations Issues and Limitations

Sources Stinson, Douglas R. Cryptography: Theory and Practice. 3rd ed. Boca Raton, FL: Chapman & Hall/CRC, Stinson, Douglas R. Cryptography: Theory and Practice. 3rd ed. Boca Raton, FL: Chapman & Hall/CRC, Tanenbaum, Andrew S., and Maarten V. Steen. Distributed Systems: Principles and Paradigms. 2nd ed. Upper Saddle River, NJ: Pearson Prentice Hall, Tanenbaum, Andrew S., and Maarten V. Steen. Distributed Systems: Principles and Paradigms. 2nd ed. Upper Saddle River, NJ: Pearson Prentice Hall, 2007.