0% found this document useful (0 votes)
46 views2 pages

Public Key Infrastructure

Public Key Infrastructure (PKI) is a framework that manages public keys for encryption, securing internet data transfers and internal communications. It operates through certificates and keys, utilizing symmetric and asymmetric encryption methods. The process of obtaining a PKI certificate involves creating a private key, verifying attributes, and getting the certificate signed by a Certificate Authority (CA).

Uploaded by

youngkbackup
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views2 pages

Public Key Infrastructure

Public Key Infrastructure (PKI) is a framework that manages public keys for encryption, securing internet data transfers and internal communications. It operates through certificates and keys, utilizing symmetric and asymmetric encryption methods. The process of obtaining a PKI certificate involves creating a private key, verifying attributes, and getting the certificate signed by a Certificate Authority (CA).

Uploaded by

youngkbackup
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Public Key Infrastructure (PKI) Definition

Public key infrastructure (PKI) refers to tools used to create and manage
public keys for encryption, which is a common method of securing data
transfers on the internet. PKI is built into all web browsers used today, and
it helps secure public internet traffic. Organizations can use it to secure
the communications they send back and forth internally and also to make
sure connected devices can connect securely.

The most important concept associated with PKI is the cryptographic


keys that are part of the encryption process and serve to authenticate
different people or devices attempting to communicate with the network.

How Does PKI Work?

PKI works through the implementation of two technologies: certificates


and keys. A key is a long number used to encrypt data. Each element of a
message gets encrypted using the key formula.

The different types are

Symmetric encryption

Symmetric encryption refers to a relatively straightforward algorithm used


to encrypt data. During World War II, Germany used symmetric encryption
to transmit private messages.

Asymmetric encryption

The risk of symmetric encryption is solved with asymmetric encryption.


With asymmetric encryption, two different keys are created to encrypt
messages: the public key and the private one. The message still has to
pass through complicated mathematical permutations to get encrypted.

Common Uses of PKI Certificates

1. Hypertext Transfer Protocol Secure (HTTPS):

2. Secure Shell (SSH):

3. Signing and encrypting emails:

How To Get a PKI Certificate


The process of creating a certificate follows several, logical steps. First, a private key is
created, which is used to calculate the public key. Then, the CA requires the private key
owner's attributes presented for verification.
After that, the public key and the owner's attributes are encoded into a digital signature
known as a certificate signing request (CSR). This then gets signed by the owner of the
key. The signature the owner provides serves as proof that they are the rightful
possessor of the private key.

The final step involves the CA. The CSR gets validated by the CA, which then also adds
its own signature to the certificate using the CA’s private key. At this point, the certificate
is considered legitimate, and communication can commence.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy