3.3.1 What key management
3 Appendix 3: General
3.2.20 Can RSA be
3.3 Key Management
3.3.1 What key management issues are involved in public-key cryptography?
3.3.2 Who needs a key?
3.3.3 How does one get a key pair?
3.3.4 Should a public key or private key be shared among users?
3.3.5 What are certificates?
3.3.6 How are certificates used?
3.3.7 Who issues certificates and how?
3.3.8 What is a CSU, or, How do certifying authorities store their private keys?
3.3.9 Are certifying authorities susceptible to attack?
3.3.10 What if the certifying authority's key is lost or compromised?
3.3.11 What are Certificate Revocation Lists (CRLs)?
3.3.12 What happens when a key expires?
3.3.13 What happens if I lose my private key?
3.3.14 What happens if my private key is compromised?
3.3.15 How should I store my private key?
3.3.16 How do I find someone else's public key?
3.3.17 How can signatures remain valid beyond the expiration dates of their keys, or, How do you verify a 20-year-old signature?
3.3.18 What is a digital time-stamping service?