PUBLIC
KEY INFRASTRUCTURE
A public key infrastructure (PKI) supports the
·
Distribution
and identification of public encryption keys
·
Enables
users and computers to exchange data over networks
·
Verify the
identity of the other party
·
Enables
people and businesses to utilize a number of secure Internet applications. For
example, secure and legally binding emails and Internet based transactions, and
services delivery can all be achieved through the use of PKI
Key Elements of PKI:-
- A trusted party(certificate authority (CA))- act as a root of trust and provides services that authenticate the identity of individuals, computers and other entities
- A registration authority(subordinate CA)- certified by a root CA to issue certificates for specific uses permitted by the root
- A certificate database- stores certificate requests and issues certificates
- A certificate store- resides on a local computer to store issued certificates and private keys
Security Features of PKI:-
Advantages of the PKI Approach:-
- PKI is a standards-based technology.
- It allows the choice of trust provider.
- It is highly scalable. User can maintain their own certificate and certificate authentication involves exchange of data between client and server only.
- PKI allows delegated trust. Users having certificate from a recognized and trusted certificate authority can authenticate themselves to a server the very first time they connect to that server without having previously been registered with the system
Disadvantages of the PKI Approach:-
- We need a thorough understanding of PKI and asymmetric encryption principles to set this up.
- Asymmetric encryption is slow so PKI is only used on short messages.
Comments