Preview

Public Key Infrastructure

Good Essays
Open Document
Open Document
2215 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Public Key Infrastructure
Public-Key Infrastructure

RFC 2822 (Internet Security Glossary) defines public-key infrastructure (PKI) as the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography. The principal objective for developing a PKI is to enable secure, convenient, and efficient acquisition of public keys. The Internet Engineering Task Force (IETF) Public Key Infrastructure X.509 (PKIX) working group has been the driving force behind setting up a formal (and generic) model based on X.509 that is suitable for deploying a certificate-based architecture on the Internet. This section describes the PKIX model.
[pic]
Figure 14.7 shows the interrelationship among the key elements of the PKIX model. These elements are • End entity: o A generic term used to denote end users, devices (e.g., servers, routers), or any other entity that can be identified in the subject field of a public key certificate. End entities typically consume and/or support PKI-related services. o • Certification authority (CA): o The issuer of certificates and (usually) certificate revocation lists (CRLs). It may also support a variety of administrative functions, although these are often delegated to one or more Registration Authorities. o • Registration authority (RA): o An optional component that can assume a number of administrative functions from the CA. The RA is often associated with the End Entity registration process, but can assist in a number of other areas as well. • CRL issuer: o An optional component that a CA can delegate to publish CRLs. • Repository: o A generic term used to denote any method for storing certificates and CRLs so that they can be retrieved by End Entities.

PKIX Management Functions

PKIX identifies a number of management functions that potentially need to be supported by management

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SFC Hinds Case Study

    • 97 Words
    • 1 Page

    access to the Federal Motor Vehicle registration system and handles all license plate issues and the turning in of old equipment and…

    • 97 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The IT Controls Overview and IT General Controls Overview sections in the Appendix 1 provide relevant terms and definitions that will be used throughout the case.…

    • 5390 Words
    • 36 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    2. Certificate Authority or Certification Authority (CA) is an entity, which is core to many PKI (Public Key Infrastructure) schemes, whose purpose is to issue digital certificates to use by other parties.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    2. We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Explain the purpose of a Public Key Infrastructure (PKI) and give an example of how you would implement it in a large organization whose major concern is the proper distribution of certificates across many sites.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. A Certification Authority (CA) is an organization whose function is to issue certificates. Its role is to confirm the identity of the party who is the subject of the certificate and attest that the public key in the generated certificate is the public key of the identified party.…

    • 647 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., ... & Vigneron, L. (2005, January). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification (pp. 281-285). Springer Berlin Heidelberg.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    set up under and administer the Australian Securities and Investments Commission Act (ASIC Act), and it carries out most of its work under the Corporations Act…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A formal statement of promise (submitted usually in response to a request for quoatation) by potential supplier to supply the goods or services required by a buyer, at a specified prices, and within a specified period.…

    • 1151 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Auditing Theory

    • 1945 Words
    • 8 Pages

    | * Compilation engagements * Engagements to apply agreed-upon procedures to information * Other related services engagements as specified by the AASC…

    • 1945 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Articles of Partnership

    • 1744 Words
    • 7 Pages

    The name given to an instrument of writing by which the parties enter into a partnership, upon the conditions therein mentioned. This instrument generally contains certain provisions which it is the object here to point out.…

    • 1744 Words
    • 7 Pages
    Good Essays