(PKI)
TS5130 System Development Theory and Practice
June 16, 2007
Table of Contents
Purpose and Function: 7
How PKI Works: 9
Table of Figures
Figure 1: Required Key and Certificate Management Services 8
Figure 2: How PKI Works 10
Abstract
This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.
Introduction
With today’s security threat of hackers, spammers and viruses infecting computers, PKI is an essential component of an overall security strategy that must work in concert with other security mechanisms, business practices, and risk management efforts to help protect vital information (Weise, 2001). The Internet isn’t the only area of security that needs PKI, e-mail systems need to incorporate a higher level of security through digital signatures and e-mail encryption within the work environment to ensure business information is exchanged between validated and trusted recipients.
History
Public Key Infrastructure (PKI) is simply the single most effective method for securing a public communications networks, and is used throughout the world for the transmission of sensitive data. Government agencies, the U.S. Army, Navy, Air force, financial and medical institutions use PKI to ensure their communications are protected and safe
References: Farrow, Rik. Private Key Infrastructure; or, why there is no Public Key Infrastructure. Retrieved May 1, 2007 from: http://www.spinit.com/Network/net0903.html Miller, Jason. GCN Staff (2006, November). PKI gets shot in the arm from HSPD-12. Government Computer News, page 7. Entrust. (2006). Securing Digital Identities & Information. What is a PKI? Retrieved May 1, 2007 from: http://www.entrust.com/pki.htm?source=overture Weise, Joel. Sun Microsystems (August 2001) Public Key Infrastructure Overview. Retrieved May 28, 2007 from: www.sun.com/blueprints Unknown Author. Public Key Encryption and Public key Infrastructure – Explained. Retrieved May 1, 2007 from: https://www.safe-mail.net/support/eng/help/protectsecure/pki.html Wikipedia, the free encyclopedia. (2007). Public Key Infrastructure. Retrieved May 1, 2007 from: http://en.wikipedia.org/wiki/Public_key_infrastructure Wikipedia, the free encyclopedia. (2007). Digital Signature. Retrieved May 1, 2007 from: http://en.wikipedia.org/wiki/Digital_signature Unknown Author. Public Key Encryption and Public key Infrastructure – Explained. Retrieved May 1, 2007 from: https://www.safe-mail.net/support/eng/help/protectsecure/pki.html