Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views3 pages

Public Key Infrastructure (PKI) : Objective: System Type: Encryption Process

Public Key Infrastructure (PKI) provides security for messages and transactions, essential for e-commerce and information privacy, using a two-key asymmetric system. Key components include a Certificate Authority (CA) that issues digital certificates, a Registration Authority (RA) that authenticates users, and the RSA encryption algorithm. The CA processes Certificate Signing Requests to issue digital certificates that associate public keys with user identities, enabling secure communication.

Uploaded by

Dylan Gomani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

Public Key Infrastructure (PKI) : Objective: System Type: Encryption Process

Public Key Infrastructure (PKI) provides security for messages and transactions, essential for e-commerce and information privacy, using a two-key asymmetric system. Key components include a Certificate Authority (CA) that issues digital certificates, a Registration Authority (RA) that authenticates users, and the RSA encryption algorithm. The CA processes Certificate Signing Requests to issue digital certificates that associate public keys with user identities, enabling secure communication.

Uploaded by

Dylan Gomani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Public Key Infrastructure (PKI) @Chidambaram-narayanan

• Objective: Provide security to messages and transactions on a large scale, supporting e-commerce, secure
transactions, and information privacy.
• System Type: Two-key, asymmetric system.
• Encryption Process: Messages are encrypted with a public key and decrypted with a private key.
Components of PKI @Chidambaram-narayanan

• Certificate Authority (CA): Issues digital certificates, verifying the identity of


users or entities.

• Registration Authority (RA): Assists CA by authenticating users before digital


certificates are issued.

• RSA (Encryption Algorithm): Asymmetric encryption algorithm used for


securing messages and transactions.

• Digital Certificates: Include public keys and user identity information, facilitating
secure communication.
Certificate Authority (CA) @Chidambaram-narayanan

• An organization responsible for issuing, revoking, • Either private or public (eg. VeriSign).
and distributing certificates in a Public-Key • Operating system providers may allow systems to be
Infrastructure (PKI). configured as CA systems, generating internal certificates
for businesses.
• A certificate associates a public key with an • The process of providing certificates may require a
individual, containing user information. server, and a Registration Authority (RA) can assist in
offloading work from the CA.
• Users submit a Certificate Signing Request
(CSR) to the CA, including their public key and
fully distinguished name.

• The CA processes the CSR to issue a digital


certificate for user authentication.

•In communication, if Mike wants to send a private


message to Jeff, a third party (CA) vouches for
Mike's authenticity, and Jeff trusts the third party.

You might also like