Preview

chapter01

Good Essays
Open Document
Open Document
7053 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
chapter01
Chapter 6 Outline
I. The Basics of Public Key Infrastructures
A. A PKI is a structure that provides all the necessary components to enable different users and entities to communicate in a secure and a predictable manner.
1. A PKI is made up of hardware, applications, policies, services, programming interfaces, cryptographic algorithms, protocols, users, and utilities.
2. These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.
B. In PKI environments, entities called registration authorities and certificate authorities require proof of identity from individuals requesting a certificate, which will then be validated.
1. The registration authority will then advise the certificate authority to generate a certificate, which is analogous to a driver's license.
2. The certificate authority will digitally sign the certificate using its private key. This is commonly referred to as a third-party trust model.
II. Certificate Authorities
A. The certificate authority (CA) is the trusted authority for certifying individuals' identities and creating an electronic document indicating that individuals are who they say they are.
B. This electronic document is referred to as a digital certificate. It establishes an association between the subject's identity and a public key. The private key that is paired with the public key in the certificate is stored separately.
C. The CA is made up of the software, hardware, procedures, policies, and people who are involved in validating individuals' identities and generating the certificates. This means that if one of these components is compromised, it can negatively affect the CA and threaten the integrity of the certificates it produces.
D. Every CA should have a certification practices statement (CPS) that outlines how identities are verified, the steps the CA follows to generate, maintain, and transmit certificates, and why the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Netw310 Week #4

    • 313 Words
    • 2 Pages

    Is the company we hire to do the work required to be registered in any way?…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    2. Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Entities can have one or more private-public key pairs and associated public key certificates. A certificate is a statement issued by a certification authority according to a policy that binds an entity 's public key to its name for a period of time. (You 'll learn more about policies later in the chapter.) Another entity that trusts this CA also trusts that the public key belongs to the named entity. When entity A is presented with a certificate by entity B, entity A can tell from the certificate name that the certificate belongs to a legitimate user of the system. Entity B proves he or she is the legitimate holder of the certificate by proving his or her knowledge of the associated private key. Entity A can optionally check the certificate 's current validity by looking it up on the CA 's CRL.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    4. Provide a step by step progression for a typical Certificate Enrollment process with a Certificate Authority.…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Explain the purpose of a Public Key Infrastructure (PKI) and give an example of how you would implement it in a large organization whose major concern is the proper distribution of certificates across many sites.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cbcs Certification

    • 309 Words
    • 2 Pages

    A provisional certificate issued by the NHA will be clearly marked with a provisional watermark. Provisionally certified candidates will have a “P” associated with their certification number and can be verified as such through the NHA candidate verification system accessible on the NHA website (www.nhanow.com).…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    PKI Paper

    • 801 Words
    • 3 Pages

    In a single service package, a commercial PKI provides reliability, support, and indemnification over in-house PKI solution. Commercial PKI offerings are relatively well-tested…

    • 801 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “Registration involves the process by which individuals or institutions list their names with an association or agency. It may be voluntary or mandatory. Education, training or bonding requirements are sometimes associated with registration.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Vrjc assignment list

    • 306 Words
    • 2 Pages

    Be sure to select the version that prints a certificate. You will need to register.…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Hello.Com

    • 339 Words
    • 2 Pages

    Each applicant must present a valid school ID or exam permit on the date of examination.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Vnx Cli Doc

    • 4521 Words
    • 19 Pages

    Change system information Change the system information attributes. Format /sys/info set [-location <value>] [-rackLocation <value>] [-contactName <value>] [-contactEmail <value>] [-contactPhone <value>] [-addr1 <value>] [-addr2 <value>] [-city <value>] [-state <value>] [-country <value>] [ postalCode <value>] [-comment <value>] Action qualifiers Example The following command changes the system information attributes: uemcli /sys…

    • 4521 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    such as the Internet. First, this article will define and provide an overview of the key…

    • 21022 Words
    • 85 Pages
    Powerful Essays