Preview

Public Key Infrastructure

Powerful Essays
Open Document
Open Document
2147 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Public Key Infrastructure
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) is a security architecture that has been introduced to provide an increasedlevel of confidence for exchanging information over an increasingly insecure Internet.
PKI may involve the use of methods, technologies and techniques that together provide a secure infrastructure. PKI involves the use of a public key and private key pair for authentication and proof of content. A PKI infrastructure is expected to offer its users the following benefits:
• certainty of the quality of information sent and received electronically
• certainty of the source and destination of that information
• assurance of the time and timing of that information (providing the source of time is known)
• certainty of the privacy of that information
• assurance that the information may be introduced as evidence in a court or law
These facilities are delivered using a mathematical technique called public key cryptography, which uses a pair of related cryptographic keys to verify the identity of the sender (signing) and/or to ensure privacy (encryption). How the Public Key Cryptography concept works
Public key cryptography uses a pair of mathematically related cryptographic keys. If one key is used to encrypt information, then only the related key can decrypt that information. Even if one of the keys is known, the other key cannot be easily calculated. Public key system consists of the following:
• A public key. This is something which is made public - it is freely distributed and can be seen by all users.
• A corresponding (and unique) private key. This is something that is kept secret - it is not shared amongst users. The private key enables its holder to prove his identity.

The Public Key used for Encryption
The sender of the message uses the receiver’s public encryption key to encrypt the confidential information. The receiver can provide his public key to the sender, or it can be retrieved from the directory

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Step 6: Once the drilling gets about 500 feet above the shale formation, a downhole drilling motor with sophisticated measuring instruments begins the angle drilling creating a new horizontal path into the shale formation.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    4. They also could use digital signature plus they could use cryptography along with it…

    • 171 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unsecured Networks – Risk from using unsecured networks can be mitigated but not eliminated. Us encryption technologies to protect the confidentiality and integrity of communications, as well as using mutual authentication mechanisms to verify the identities of both endpoints…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Authentication in definition is simply proof that something is real or what it is meant to be. Public networks as well as private networks to include the internet use passwords as authentication to authorize logins. Data is required and is filtered through the password database if an effort to ensure that the user is authentic. Also, before anyone is allowed to access an organization’s intranet they must first be registered by someone that has the appropriate credentials to authorize them to gain access. There are plenty of businesses and alternative in the need of additional authentication methods and one method worthy of mentioning is the utilization of digital certificates issued and verified by a Certificate Authority or as commonly used the acronym CA.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    5) What is the name of the process which proves you are who you say you are? D) Authentication…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    A PKI is a structure that provides all the necessary components to enable different users and entities to communicate in a secure and a predictable manner.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Senior UI designer

    • 2702 Words
    • 11 Pages

    It provides leadership in addressing issues that confront the future of the Internet and is the…

    • 2702 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Digital Signature

    • 328 Words
    • 2 Pages

    To generate digital signature we use cryptography technique combine with a hash function and a proper algorithm which provides a public and private key pair .A public key can be used to check digital signatures, created with the corresponding private key, as well as for encrypting documents that can then be decrypted only by the owner of the corresponding private key. The public keys are not secret to anybody. The private key is a number known only to its owner. With his or her private key, a person can sign documents and decrypt documents that are encrypted with corresponding public key. So digital signature may resemble with a unique password for electronic…

    • 328 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Planet Biometrics Analysis

    • 1797 Words
    • 8 Pages

    The reliability of a system refers to how reliably it can handle the users with…

    • 1797 Words
    • 8 Pages
    Powerful Essays