Designed for practitioners and researchers in industry, this wide-ranging handbook provides a professional-level examination of security aspects of public key infrastructures. Where other references focus solely PGP or on X500/X509, Secure Public Key Infrastructure goes further to deal with corrupt certification authorities (CAs) and CAs whose computers were hacked. Most important, this reference includes strategies to survive limited malicious attacks on public key infrastructures, and lays the groundwork for the development of future safeguards.