Public key infrastructure with the Dogtag certificate system

TAG MASTER

Article from Issue 101/2009
Author(s):

If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system.

Asymmetric cryptography provides a powerful and convenient means for encrypting Internet communications. In this scenario, each entity involved in the encryption system possesses a pair of keys: a public key and a private key. The public key is used to encrypt data or to validate signatures. Data encrypted with the public key is then decrypted with the matching private key.

If Alice wants to send an encrypted message to Bob, she needs to obtain Bob’s public key for her key ring. Encryption software on Alice’s computer then uses Bob’s public key to encrypt the message, and Bob’s computer uses Bob’s private key to decrypt it.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus

Direct Download

Read full article as PDF:

051-055_dogtag.pdf (766.80 kB)

News