ABSTRACT

As the name implies, this chapter will deal with the many facets and ramifications of public key cryptography and its associated infrastructure. This topic will entail consideration of signatures, certificates and standards. The chapter will conclude with a discussion of email security.