Public Key Infrastructure (PKI) @Chidambaram-narayanan
• Objective: Provide security to messages and transactions on a large scale, supporting e-commerce, secure
transactions, and information privacy.
• System Type: Two-key, asymmetric system.
• Encryption Process: Messages are encrypted with a public key and decrypted with a private key.
Components of PKI @Chidambaram-narayanan
• Certificate Authority (CA): Issues digital certificates, verifying the identity of
users or entities.
• Registration Authority (RA): Assists CA by authenticating users before digital
certificates are issued.
• RSA (Encryption Algorithm): Asymmetric encryption algorithm used for
securing messages and transactions.
• Digital Certificates: Include public keys and user identity information, facilitating
secure communication.
Certificate Authority (CA) @Chidambaram-narayanan
• An organization responsible for issuing, revoking, • Either private or public (eg. VeriSign).
and distributing certificates in a Public-Key • Operating system providers may allow systems to be
Infrastructure (PKI). configured as CA systems, generating internal certificates
for businesses.
• A certificate associates a public key with an • The process of providing certificates may require a
individual, containing user information. server, and a Registration Authority (RA) can assist in
offloading work from the CA.
• Users submit a Certificate Signing Request
(CSR) to the CA, including their public key and
fully distinguished name.
• The CA processes the CSR to issue a digital
certificate for user authentication.
•In communication, if Mike wants to send a private
message to Jeff, a third party (CA) vouches for
Mike's authenticity, and Jeff trusts the third party.