Home arrow Security arrow PKI: Looking at the Risks

PKI: Looking at the Risks

Public key infrastructure (PKI) is an excellent technology to help users certify that the people or companies they are corresponding with are who they say they are. It has proven itself invaluable in e-commerce among other areas. As with any technology, however, it is not without its own security risks. Eliana Stavrou discusses these risks, and ways to minimize them.

  1. PKI: Looking at the Risks
  2. Trust establishment
  3. Private key protection
  4. CRL availability
  5. Key generation
  6. Legislation compliance
By: Eliana Stavrou
Rating: starstarstarstarstar / 9
January 24, 2005

print this article



To be fair to the readers, I believe that it is time to explain the possible risks and threats associated with Public Key Infrastructure (PKI). Until now, I have given you a lot of information on how to use PKI. (Editor's note: see Eliana Stavrou's articles on ASP Free). Although PKI is considered a must-have technology, it is not bullet-proof. Any security solution we have applied has its own problems; so does PKI. A silver bullet may not exist to solve all the security issues, but a combination of solutions along with the knowledge of their drawbacks gives us the vantage to close open holes and create a strong security solution.

In this article, I will discuss concepts related to PKI technology, so you need to be familiar with the PKI process.

The risks that are described in this article are the following:

  1. Trust establishment

  2. Private key protection

  3. CRL availability

  4. Key generation

  5. Legislation compliance 

>>> More Security Articles          >>> More By Eliana Stavrou

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort


- Secure Your Business for Data Privacy Day
- Google Testing Security Fob Password Alterna...
- Security News Highlights Concerns
- Going to Extremes for Data Security
- Skipfish Website Vulnerability Scanner
- Critical Microsoft Visual Studio Security Pa...
- US Faces Tech Security Expert Deficit
- LAN Reconnaissance
- An Epilogue to Cryptography
- A Sequel to Cryptography
- An Introduction to Cryptography
- Security Overview
- Network Security Assessment
- Firewalls
- What’s behind the curtain? Part II

Developer Shed Affiliates


Dev Shed Tutorial Topics: