Security without Obscurity : A Guide to PKI Operations