Jump to content

Talk:Public key infrastructure: Difference between revisions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Content deleted Content added
Diagrams
Line 7: Line 7:
== Example of Use ==
== Example of Use ==
There should be a statement of use in the summary statement. It would be even better if there was an example of use given in the summary. [[User:Anon lynx|Stephen Charles Thompson]] ([[User talk:Anon lynx|talk]]) 00:33, 26 October 2008 (UTC)
There should be a statement of use in the summary statement. It would be even better if there was an example of use given in the summary. [[User:Anon lynx|Stephen Charles Thompson]] ([[User talk:Anon lynx|talk]]) 00:33, 26 October 2008 (UTC)

should there be some examples of use outside strict computer-computer communication? - eg electronic passports are signed for verification purposes-- http://www.dfat.gov.au/dept/passports/ and the australian passport uses encryption in 2 ways, 1 to sign the info on there (so you know its a genuine passport) and the other is a written internal key which is needed to decode the rfid data from the chip in the card. [[Special:Contributions/130.102.0.171|130.102.0.171]] ([[User talk:130.102.0.171|talk]]) 02:01, 3 February 2009 (UTC)


== Diagrams ==
== Diagrams ==

Revision as of 02:01, 3 February 2009

WikiProject iconCryptography: Computer science Unassessed
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science.

Template:CryptographyReader

Example of Use

There should be a statement of use in the summary statement. It would be even better if there was an example of use given in the summary. Stephen Charles Thompson (talk) 00:33, 26 October 2008 (UTC)[reply]

should there be some examples of use outside strict computer-computer communication? - eg electronic passports are signed for verification purposes-- http://www.dfat.gov.au/dept/passports/ and the australian passport uses encryption in 2 ways, 1 to sign the info on there (so you know its a genuine passport) and the other is a written internal key which is needed to decode the rfid data from the chip in the card. 130.102.0.171 (talk) 02:01, 3 February 2009 (UTC)[reply]

Diagrams

  • Add some diagrams, maybe something like [1], [2], [3]?
If you wish, you may use the material at [4] for this - we've tried to make it "non-sales" literature, and we can grant use of it to Wikipedia. - Ppatters 19:55, 31 December 2006 (UTC)[reply]
Ppatters, you have to release those materials to the public domain then upload it. Stephen Charles Thompson (talk) 00:36, 26 October 2008 (UTC)[reply]


It occurs to me that some vendor references might be pertinent, i.e., PKI Innovations Inc. (http://www.pk3i.com).

---

Matt, The use of computing that you cut was the result of some cogitation. I was trying to make clear in the wording that there are multiple uses, not merely in overt crypto or overt computer security. PKIs are hidden from view in many contexts and not all of them are either. For instance, copyright protection is commercial and would use squirrels if there were any prospect of it working. That it uses (or misuses, misapplies, goofs badly, ...) crypto, and claims to be a computer security issue is another thing altogether. The point was worth making, though perhaps it was made too covertly. Have you a suggestion? ww 19:50, 14 Jul 2004 (UTC)

The real purpose of putting "In field F, ..." at the start of articles is to provide the reader with some context about what general domain he's reading about. If the clause is too wordy, then I think it lessens the usefulness. — Matt 20:04, 14 Jul 2004 (UTC)

---

If PKIX is to be merged with anything, it needs to be merged with X.509 not Public_key_infrastructure, because X.509 is a subset of Public_key_infrastructure and PKIX is related entirely to the subset rather than the set. Stuartyeates 07:10, 30 May 2006 (UTC)[reply]

---


I added a link to a FAQ at Entrust website, which presents a useful overview of a PKI. At least I appreciated it as an engineering student, it doesn't have the purpose of advertise a company instead of one another (by the way, I know nothing about their products). carlo —Preceding unsigned comment added by 83.184.183.81 (talkcontribs) 08:24, 26 June 2006

diagram

Diagram has no description, RA and VA are not referenced in the article. Also the order of arrows would be unclear to novice reader. Maybe someone could help? Gryszkalis 11:21, 20 October 2007 (UTC)[reply]

Plagiarism?

Do slides 14-17 from the following URL seem awfully familiar when reading the "PKI Software" section of this article?

http://ocw.kfupm.edu.sa/user062/CSE55101/KeyM.pdf

What is the usual course of action in this case?

Also, I think some of these products do not exist anymore (e.g. CyberTrust TrustedCA)...or never existed.

Karl Wiegand (talk) 00:56, 27 December 2007 (UTC)[reply]

Well, it's not clear which cis original. I would suspect the slides are preped from the wikipedia page though, as the section was added 1st March 2007, nearly 3 months before the slides are dated. RobbieAB (talk) 02:51, 2 April 2008 (UTC)aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa[reply]

"bind" should be more prominent.

Over the past year, when trying to explain digital security and digital certificates, I've found people stumble until they grasp the concept of BINDING a digital certificate to a person's identity. This article makes the point very early, which is good, but I think you should make it much more emphatically. ie bold, linked to a detailed explanation, etc.

Richard. —Preceding unsigned comment added by Richardh9935 (talkcontribs) 01:41, 2 July 2008 (UTC)[reply]

'VA' ?

In the diagram on the page is an object called 'VA', but this term is not explained or referenced to in the main text. 77.63.71.8 (talk) 10:52, 20 October 2008 (UTC)[reply]


It probably stands for Validation Authority AH, S+