Skip to main content

Posts

Showing posts from April 3, 2015

PUBLIC KEY INFRASTRUCTURE

PUBLIC KEY INFRASTRUCTURE A public key infrastructure (PKI) supports the ·        Distribution and identification of public encryption keys ·        Enables users and computers to exchange data over networks   ·        Verify the identity of the other party ·        Enables people and businesses to utilize a number of secure Internet applications. For example, secure and legally binding emails and Internet based transactions, and services delivery can all be achieved through the use of PKI Key Elements of PKI:- A trusted party( certificate authority (CA) )- act as a root of trust and provides services that authenticate the identity of individuals, computers and other entities A registration authority (subordinate CA)- certified by a root CA to issue certificates for specific uses permitted by the root A certificate database- stores certificate requests and issues certificates A certificate store- resid