Key Recovery for Certification Authorities

Authors

  • Eduard Tric Vexilla

Keywords:

certification authority, key recovery, split secret

Abstract

The root key is the most important asset of a certification authority. There are several ways to protect it and to make a secure backup copy. We are describing one of the most elegant protection techniques that will be used by a real Certification Authority.

Author Biography

Eduard Tric, Vexilla

Vexilla

References

http://www.keynectis.com - Commercial site

http://www.europepki.org - Demonstration site

http://www.wspes.org - Eten project site

http://primes.utm.edu/primes/page.php - Prime numbers

http://www.schneier.com/book-applied.html - Applied Cryptography Book

Menezes, A., Van Oorschot, P., Vanstone, S., Handbook of Applied Cryptography, CRC Press, 1996, page 526

Downloads

Published

2010-12-30

How to Cite

Tric, E. (2010). Key Recovery for Certification Authorities. Journal of Mobile, Embedded and Distributed Systems, 2(2), 65-68. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/Key-Recovery-for-Certification-Authorities