Presentation is loading. Please wait.

Presentation is loading. Please wait.

PKI (Public Key Infrastructure)

Similar presentations


Presentation on theme: "PKI (Public Key Infrastructure)"— Presentation transcript:

1 PKI (Public Key Infrastructure)

2 PKI - Introduction Set of end-user, hardware, rules, policies and procedure needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption Issues Digital certificate to end user Objective: To enable secure, convenient and efficient acquisition of public keys

3 Diagram CA  Certificate Authority RA  Registration Authority
VA  Validation Authority

4 Key element End Entity A certificate authority (CA) that stores, issues and signs the digital certificates A registration authority which verifies the identity of entities requesting their digital certificates to be stored at the CA A central directory—i.e., a secure location in which to store and index keys A certificate management system managing things like the access to stored certificates or the delivery of the certificates to be issued. A certificate policy

5 Digital Certificate An electronic document used to prove ownership of a public key Includes information about the key, information about its owner's identity, and the digital signature of an entity that has verified the certificate's contents are correct. If the signature is valid, and the person examining the certificate trusts the signer, then they know they can use that key to communicate with its owner. In a typical PKI scheme, the signer is a certificate authority (CA), usually a company that charges customers to issue certificates for them.

6 Contents of a typical digital certificate
Serial Number: Used to uniquely identify the certificate. Subject: The person, or entity identified. Signature Algorithm: The algorithm used to create the signature. Signature: The actual signature to verify that it came from the issuer. Issuer: The entity that verified the information and issued the certificate. Valid-From: The date the certificate is first valid from. Valid-To: The expiration date. Key-Usage: Purpose of the public key (e.g. encipherment, signature, certificate signing...). Public Key: The public key. Thumbprint Algorithm: The algorithm used to hash the public key certificate. Thumbprint (also known as fingerprint): The hash itself, used as an abbreviated form of the public key certificate.

7 Components of Digital Certificate (X.5090


Download ppt "PKI (Public Key Infrastructure)"

Similar presentations


Ads by Google