SlideShare a Scribd company logo
PKI Concepts: What are the core components of a PKI? Briefly describe each component
Discuss the trustworthiness of squareroot certificates provided by browsers. (3) What is the
purpose of the X.509 standard and what is a certificate chain? How is an X.509 certificate
revoked?
Solution
A public key infrastructure ( PKI ) is a set of roles, policies, and procedures needed to create,
manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of
network activities such as e-commerce, internet banking and confidential email. It is required for
activities where simple passwords are an inadequate authentication method and more rigorous
proof is required to confirm the identity of the parties involved in the communication and to
validate the information being transferred.
In cryptography, a PKI is an arrangement that binds public keys with respective identities of
entities (like persons and organizations). The binding is established through a process of
registration and issuance of certificates at and by a certificate authority (CA). Depending on the
assurance level of the binding, this may be carried out by an automated process or under human
supervision.
The PKI role that assures valid and correct registration is called registration authority (RA). An
RA is responsible for accepting requests for digital certificates and authenticating the entity
making the request. In a Microsoft PKI, a registration authority is usually called a subordinate
CA.
An entity must be uniquely identifiable within each CA domain on the basis of information about
that entity. A third-party validation authority (VA) can provide this entity information on behalf
of the CA.
PKI Concepts- What are the core components of a PKI- Briefly describe.docx

More Related Content

Similar to PKI Concepts- What are the core components of a PKI- Briefly describe.docx

317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
P2PSystem
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
Arab Federation for Digital Economy
 
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
IJNSA Journal
 
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
durantheseldine
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
Drysign By Exela
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
Aditya Nama
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
Editor IJARCET
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
Editor IJARCET
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
CSCJournals
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
SC Leung
 
Uport a blockchain platform for self-sovereign identity
Uport   a blockchain platform for self-sovereign identityUport   a blockchain platform for self-sovereign identity
Uport a blockchain platform for self-sovereign identity
Ian Beckett
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
KrutiShah114
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Omlis
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
Mohit Modi
 
technology
technologytechnology
technology
nomber8
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
IJCSIS Research Publications
 
Pki and OpenSSL
Pki and OpenSSLPki and OpenSSL
Pki and OpenSSL
Tony Fabeen
 
Alpha Education
Alpha EducationAlpha Education
Alpha Education
Alpha20 Group
 

Similar to PKI Concepts- What are the core components of a PKI- Briefly describe.docx (20)

317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
COMPARISON OF CERTIFICATE POLICIES FORMERGING PUBLIC KEY INFRASTRUCTURESDURIN...
 
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
Uport a blockchain platform for self-sovereign identity
Uport   a blockchain platform for self-sovereign identityUport   a blockchain platform for self-sovereign identity
Uport a blockchain platform for self-sovereign identity
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
technology
technologytechnology
technology
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
Pki and OpenSSL
Pki and OpenSSLPki and OpenSSL
Pki and OpenSSL
 
Alpha Education
Alpha EducationAlpha Education
Alpha Education
 

More from ellenj4

The function and process whereby physicians- nurses- and social worker.docx
The function and process whereby physicians- nurses- and social worker.docxThe function and process whereby physicians- nurses- and social worker.docx
The function and process whereby physicians- nurses- and social worker.docx
ellenj4
 
The four components of aggregate expenditures are- Question 3 options-.docx
The four components of aggregate expenditures are- Question 3 options-.docxThe four components of aggregate expenditures are- Question 3 options-.docx
The four components of aggregate expenditures are- Question 3 options-.docx
ellenj4
 
The IS staff wants to know about important management tools built into.docx
The IS staff wants to know about important management tools built into.docxThe IS staff wants to know about important management tools built into.docx
The IS staff wants to know about important management tools built into.docx
ellenj4
 
The Inventive Co- is considering a new project- This project requires.docx
The Inventive Co- is considering a new project- This project requires.docxThe Inventive Co- is considering a new project- This project requires.docx
The Inventive Co- is considering a new project- This project requires.docx
ellenj4
 
The internal document that is prepared to notify the appropriate perso.docx
The internal document that is prepared to notify the appropriate perso.docxThe internal document that is prepared to notify the appropriate perso.docx
The internal document that is prepared to notify the appropriate perso.docx
ellenj4
 
The Impact of Technology on the Developing Child name 7 negative ways.docx
The Impact of Technology on the Developing Child name 7 negative ways.docxThe Impact of Technology on the Developing Child name 7 negative ways.docx
The Impact of Technology on the Developing Child name 7 negative ways.docx
ellenj4
 
The Homeland Security Act of 2002 is divided into 17 titles while brin.docx
The Homeland Security Act of 2002 is divided into 17 titles while brin.docxThe Homeland Security Act of 2002 is divided into 17 titles while brin.docx
The Homeland Security Act of 2002 is divided into 17 titles while brin.docx
ellenj4
 
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docxThe Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
ellenj4
 
The following table contains national income accounting data for a hyp.docx
The following table contains national income accounting data for a hyp.docxThe following table contains national income accounting data for a hyp.docx
The following table contains national income accounting data for a hyp.docx
ellenj4
 
The following items are taken from the financial statements of the Pos.docx
The following items are taken from the financial statements of the Pos.docxThe following items are taken from the financial statements of the Pos.docx
The following items are taken from the financial statements of the Pos.docx
ellenj4
 
The following program has already been written to populate its data ar.docx
The following program has already been written to populate its data ar.docxThe following program has already been written to populate its data ar.docx
The following program has already been written to populate its data ar.docx
ellenj4
 
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docxThe German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
ellenj4
 
The graph of temperature versus molar mass is given for the hydrides o.docx
The graph of temperature versus molar mass is given for the hydrides o.docxThe graph of temperature versus molar mass is given for the hydrides o.docx
The graph of temperature versus molar mass is given for the hydrides o.docx
ellenj4
 
The general role of financial intermediaries is to- A-Provide advice t (1).docx
The general role of financial intermediaries is to- A-Provide advice t (1).docxThe general role of financial intermediaries is to- A-Provide advice t (1).docx
The general role of financial intermediaries is to- A-Provide advice t (1).docx
ellenj4
 
The general role of financial intermediaries is to- A-Provide advice t.docx
The general role of financial intermediaries is to- A-Provide advice t.docxThe general role of financial intermediaries is to- A-Provide advice t.docx
The general role of financial intermediaries is to- A-Provide advice t.docx
ellenj4
 
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docxThe functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
ellenj4
 
The following information pertains to Naomi Campbell Company as of Dec.docx
The following information pertains to Naomi Campbell Company as of Dec.docxThe following information pertains to Naomi Campbell Company as of Dec.docx
The following information pertains to Naomi Campbell Company as of Dec.docx
ellenj4
 
The G Banking Group recently reported that it was offshoring (moving).docx
The G Banking Group recently reported that it was offshoring (moving).docxThe G Banking Group recently reported that it was offshoring (moving).docx
The G Banking Group recently reported that it was offshoring (moving).docx
ellenj4
 
Please do not answer if you-'re unsure of the answer- Thanks!.docx
Please do not answer if you-'re unsure of the answer- Thanks!.docxPlease do not answer if you-'re unsure of the answer- Thanks!.docx
Please do not answer if you-'re unsure of the answer- Thanks!.docx
ellenj4
 
Please describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docxPlease describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docx
ellenj4
 

More from ellenj4 (20)

The function and process whereby physicians- nurses- and social worker.docx
The function and process whereby physicians- nurses- and social worker.docxThe function and process whereby physicians- nurses- and social worker.docx
The function and process whereby physicians- nurses- and social worker.docx
 
The four components of aggregate expenditures are- Question 3 options-.docx
The four components of aggregate expenditures are- Question 3 options-.docxThe four components of aggregate expenditures are- Question 3 options-.docx
The four components of aggregate expenditures are- Question 3 options-.docx
 
The IS staff wants to know about important management tools built into.docx
The IS staff wants to know about important management tools built into.docxThe IS staff wants to know about important management tools built into.docx
The IS staff wants to know about important management tools built into.docx
 
The Inventive Co- is considering a new project- This project requires.docx
The Inventive Co- is considering a new project- This project requires.docxThe Inventive Co- is considering a new project- This project requires.docx
The Inventive Co- is considering a new project- This project requires.docx
 
The internal document that is prepared to notify the appropriate perso.docx
The internal document that is prepared to notify the appropriate perso.docxThe internal document that is prepared to notify the appropriate perso.docx
The internal document that is prepared to notify the appropriate perso.docx
 
The Impact of Technology on the Developing Child name 7 negative ways.docx
The Impact of Technology on the Developing Child name 7 negative ways.docxThe Impact of Technology on the Developing Child name 7 negative ways.docx
The Impact of Technology on the Developing Child name 7 negative ways.docx
 
The Homeland Security Act of 2002 is divided into 17 titles while brin.docx
The Homeland Security Act of 2002 is divided into 17 titles while brin.docxThe Homeland Security Act of 2002 is divided into 17 titles while brin.docx
The Homeland Security Act of 2002 is divided into 17 titles while brin.docx
 
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docxThe Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
The Homeland Security Act of 2002 is divided into 17 titles while brin (1).docx
 
The following table contains national income accounting data for a hyp.docx
The following table contains national income accounting data for a hyp.docxThe following table contains national income accounting data for a hyp.docx
The following table contains national income accounting data for a hyp.docx
 
The following items are taken from the financial statements of the Pos.docx
The following items are taken from the financial statements of the Pos.docxThe following items are taken from the financial statements of the Pos.docx
The following items are taken from the financial statements of the Pos.docx
 
The following program has already been written to populate its data ar.docx
The following program has already been written to populate its data ar.docxThe following program has already been written to populate its data ar.docx
The following program has already been written to populate its data ar.docx
 
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docxThe German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
The German philosopher Immanuel Kant condemned Utilitarianism as an im.docx
 
The graph of temperature versus molar mass is given for the hydrides o.docx
The graph of temperature versus molar mass is given for the hydrides o.docxThe graph of temperature versus molar mass is given for the hydrides o.docx
The graph of temperature versus molar mass is given for the hydrides o.docx
 
The general role of financial intermediaries is to- A-Provide advice t (1).docx
The general role of financial intermediaries is to- A-Provide advice t (1).docxThe general role of financial intermediaries is to- A-Provide advice t (1).docx
The general role of financial intermediaries is to- A-Provide advice t (1).docx
 
The general role of financial intermediaries is to- A-Provide advice t.docx
The general role of financial intermediaries is to- A-Provide advice t.docxThe general role of financial intermediaries is to- A-Provide advice t.docx
The general role of financial intermediaries is to- A-Provide advice t.docx
 
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docxThe functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
The functional group RCO2R-' is characteristic of a(n) ____- 1) 2) 3).docx
 
The following information pertains to Naomi Campbell Company as of Dec.docx
The following information pertains to Naomi Campbell Company as of Dec.docxThe following information pertains to Naomi Campbell Company as of Dec.docx
The following information pertains to Naomi Campbell Company as of Dec.docx
 
The G Banking Group recently reported that it was offshoring (moving).docx
The G Banking Group recently reported that it was offshoring (moving).docxThe G Banking Group recently reported that it was offshoring (moving).docx
The G Banking Group recently reported that it was offshoring (moving).docx
 
Please do not answer if you-'re unsure of the answer- Thanks!.docx
Please do not answer if you-'re unsure of the answer- Thanks!.docxPlease do not answer if you-'re unsure of the answer- Thanks!.docx
Please do not answer if you-'re unsure of the answer- Thanks!.docx
 
Please describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docxPlease describe the process of the Implementation of Role-based access.docx
Please describe the process of the Implementation of Role-based access.docx
 

Recently uploaded

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 

PKI Concepts- What are the core components of a PKI- Briefly describe.docx

  • 1. PKI Concepts: What are the core components of a PKI? Briefly describe each component Discuss the trustworthiness of squareroot certificates provided by browsers. (3) What is the purpose of the X.509 standard and what is a certificate chain? How is an X.509 certificate revoked? Solution A public key infrastructure ( PKI ) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email. It is required for activities where simple passwords are an inadequate authentication method and more rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred. In cryptography, a PKI is an arrangement that binds public keys with respective identities of entities (like persons and organizations). The binding is established through a process of registration and issuance of certificates at and by a certificate authority (CA). Depending on the assurance level of the binding, this may be carried out by an automated process or under human supervision. The PKI role that assures valid and correct registration is called registration authority (RA). An RA is responsible for accepting requests for digital certificates and authenticating the entity making the request. In a Microsoft PKI, a registration authority is usually called a subordinate CA. An entity must be uniquely identifiable within each CA domain on the basis of information about that entity. A third-party validation authority (VA) can provide this entity information on behalf of the CA.