SlideShare a Scribd company logo
TOPIC- PUBLIC KEY INFRASTRUCTURE
ADITYA NAMA
What is Public Key Infrastructure?
A public key infrastructure (PKI) allows users of the Internet and other public
networks to engage in secure communication, data exchange and money exchange.
This is done through public and private cryptographic key pairs provided by a
certificate authority.
There are different types of systems in a PKI:
• Private and Public Key Systems:
Private systems are symmetric cryptography and a public systems are asymmetric
cryptography. Currently, public key systems are the most common.
• Symmetric Encryption Systems:
The same key is used for both the processes of encryption and decryption.
• Asymmetric Encryption Systems:
A different key is used for each process. One key is the public key and the other key
is the private key. If something is encrypted with the public key, then decryption can
only be done with the private key. Alternatively, if something is encrypted with the
private key, then decryption must be done only with the public key.
It is a Framework that allows different it systems to have:
Throughout authentication with
JOHN SUZZANE
Secure Message
REQUEST
SENDS HER KEY TO JOHN TO
ENCRYPT THE MESSAGE
Encrypted Message
Can be distributed
to anyone
Uses to Decrypt
the message and
read it.
Let’s take an example: -
How do we really know that John really got Suzzane Public key?
Someone could have pretended to be Suzzane and send John her/his
Public key.
This is where Digital Certificates come in.
SUZZANE
What is Digital Certificate?
• They are the data packages that Identifies the entity.
What is Digital Certificates?
• The Digital Certificates itself is protected by
asymmetric cryptography
A trusted party known as Certificate Authority(CA) issues these
Digital Certificates to the person once a certain confidence in the person's
identity has been established by the CA.
PKI is also often backed up by legislation that is country specific. PKI
Might be present in
CA is both an organization as well as set of IT system that is:
• Responsible for Issuing
• Revoking
• It is often a third party organization that is trusted by all parties
participating in PKI.
REGISTRATION AUTHORITY(RA):
The Registration Authority (RA) is to evaluate the credentials and relevant
evidence that a person requesting a certificate is as claimed, certify for that
association of an electronic identification, public key and approves the
request for issuance of a certificate by a CA.
Organizations can also have their In-house CA system. Secure matrix PKI in a BOX
Appliance allows organizations to exactly do that with ease and at a lower cost.
Now take that example again of John and Suzzane but this time with PKI:
JOHN
SUZZANE
Secure Message
The Digital Certificate contains suzzane’s particulars, Public Key, the CAS
particulars and cryptographic data all the information needed to identify
the entity with a high level of confidence. The process will remain same but
this time John make sure that the Public Key came from Suzzane by
validating DC.
• It allows the choice of trust provider.
• Users maintain their own certificates, and certificate authentication involves exchange of
data between client and server only. This means that no third party authentication server
needs to be online. There is thus no limit to the number of users who can be supported
using PKI.
• PKI allows delegated trust. That is, a user who has obtained a certificate from a
recognized and trusted certificate authority can authenticate himself to a server the very
first time he connects to that server, without having previously been registered with the
system.
Advantages of the PKI:
Disadvantages of the PKI
• Computer has to work very hard to both encrypt and decrypt data using the system.
In applications where we need to work with large quantities of encrypted data on a
regular basis, the computational overhead means that public key systems can be
very slow.
• The certification authority may be get compromised, the criminal could issue false
certificates and fool people into sending data to the wrong place.
• However, once you receive that credit card data, if you leave a computer with
access to your server out in the open, someone could sit down at the keyboard,
download all of the securely transferred data and steal it. Public key encryption
won't protect against that and, as such, it's only a part of an overall security system.
END!
SOURCE IS SECURED
for links send me your Digital Certificate.
Public key infrastructure

More Related Content

What's hot

Digital Signature
Digital SignatureDigital Signature
Digital Signature
saurav5884
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Buddhika Karunanayaka
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
Bibek Subedi
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
Mohamed Talaat
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
Samip jain
 
Digital signature
Digital  signatureDigital  signature
Digital signature
AJAL A J
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
Arun ACE
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
Rutvik Mehta
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
NetGains Technologies Pvt. Ltd.
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
Kerberos
KerberosKerberos
Kerberos
Rahul Pundir
 
Authentication
AuthenticationAuthentication
Authentication
primeteacher32
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 

What's hot (20)

Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Kerberos Authentication Protocol
Kerberos Authentication ProtocolKerberos Authentication Protocol
Kerberos Authentication Protocol
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Digital signature
Digital  signatureDigital  signature
Digital signature
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Digital signature & certificate
Digital signature & certificateDigital signature & certificate
Digital signature & certificate
 
Cryptography
CryptographyCryptography
Cryptography
 
Kerberos
KerberosKerberos
Kerberos
 
Authentication
AuthenticationAuthentication
Authentication
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 

Similar to Public key infrastructure

Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
Anvesh Vision Private Limited
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
Avirot Mitamura
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
Drysign By Exela
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
PT Datacomm Diangraha
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
Vivaka Nand
 
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdfDefine PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
xlynettalampleyxc
 
E collaborationscottrea
E collaborationscottreaE collaborationscottrea
E collaborationscottrea
Collaborative Health Consortium
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
Lisa Olive
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
Bangladesh Network Operators Group
 
PUBLIC KEY INFRASTRUCTURE Network and network devices
PUBLIC KEY INFRASTRUCTURE Network and network devicesPUBLIC KEY INFRASTRUCTURE Network and network devices
PUBLIC KEY INFRASTRUCTURE Network and network devices
antrikshjainwork
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptx
RAMESHMRA21130030110
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
CSCJournals
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
Mohammad Yousri
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
Editor IJARCET
 

Similar to Public key infrastructure (20)

Everything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdfEverything you need to Know about PKI .pdf
Everything you need to Know about PKI .pdf
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdfDefine PKI (Public Key Infrastructure) and list and discuss the type.pdf
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
 
E collaborationscottrea
E collaborationscottreaE collaborationscottrea
E collaborationscottrea
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
PUBLIC KEY INFRASTRUCTURE Network and network devices
PUBLIC KEY INFRASTRUCTURE Network and network devicesPUBLIC KEY INFRASTRUCTURE Network and network devices
PUBLIC KEY INFRASTRUCTURE Network and network devices
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptxUnit 4 (Part II) - Authentication Framework for PKC.pptx
Unit 4 (Part II) - Authentication Framework for PKC.pptx
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 

Recently uploaded

Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 

Recently uploaded (12)

Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 

Public key infrastructure

  • 1. TOPIC- PUBLIC KEY INFRASTRUCTURE ADITYA NAMA
  • 2. What is Public Key Infrastructure? A public key infrastructure (PKI) allows users of the Internet and other public networks to engage in secure communication, data exchange and money exchange. This is done through public and private cryptographic key pairs provided by a certificate authority. There are different types of systems in a PKI: • Private and Public Key Systems: Private systems are symmetric cryptography and a public systems are asymmetric cryptography. Currently, public key systems are the most common. • Symmetric Encryption Systems: The same key is used for both the processes of encryption and decryption. • Asymmetric Encryption Systems: A different key is used for each process. One key is the public key and the other key is the private key. If something is encrypted with the public key, then decryption can only be done with the private key. Alternatively, if something is encrypted with the private key, then decryption must be done only with the public key.
  • 3. It is a Framework that allows different it systems to have: Throughout authentication with
  • 4. JOHN SUZZANE Secure Message REQUEST SENDS HER KEY TO JOHN TO ENCRYPT THE MESSAGE Encrypted Message Can be distributed to anyone Uses to Decrypt the message and read it. Let’s take an example: -
  • 5. How do we really know that John really got Suzzane Public key? Someone could have pretended to be Suzzane and send John her/his Public key. This is where Digital Certificates come in. SUZZANE
  • 6. What is Digital Certificate? • They are the data packages that Identifies the entity. What is Digital Certificates? • The Digital Certificates itself is protected by asymmetric cryptography A trusted party known as Certificate Authority(CA) issues these Digital Certificates to the person once a certain confidence in the person's identity has been established by the CA.
  • 7. PKI is also often backed up by legislation that is country specific. PKI Might be present in CA is both an organization as well as set of IT system that is: • Responsible for Issuing • Revoking • It is often a third party organization that is trusted by all parties participating in PKI. REGISTRATION AUTHORITY(RA): The Registration Authority (RA) is to evaluate the credentials and relevant evidence that a person requesting a certificate is as claimed, certify for that association of an electronic identification, public key and approves the request for issuance of a certificate by a CA.
  • 8. Organizations can also have their In-house CA system. Secure matrix PKI in a BOX Appliance allows organizations to exactly do that with ease and at a lower cost. Now take that example again of John and Suzzane but this time with PKI:
  • 9. JOHN SUZZANE Secure Message The Digital Certificate contains suzzane’s particulars, Public Key, the CAS particulars and cryptographic data all the information needed to identify the entity with a high level of confidence. The process will remain same but this time John make sure that the Public Key came from Suzzane by validating DC.
  • 10. • It allows the choice of trust provider. • Users maintain their own certificates, and certificate authentication involves exchange of data between client and server only. This means that no third party authentication server needs to be online. There is thus no limit to the number of users who can be supported using PKI. • PKI allows delegated trust. That is, a user who has obtained a certificate from a recognized and trusted certificate authority can authenticate himself to a server the very first time he connects to that server, without having previously been registered with the system. Advantages of the PKI: Disadvantages of the PKI • Computer has to work very hard to both encrypt and decrypt data using the system. In applications where we need to work with large quantities of encrypted data on a regular basis, the computational overhead means that public key systems can be very slow.
  • 11. • The certification authority may be get compromised, the criminal could issue false certificates and fool people into sending data to the wrong place. • However, once you receive that credit card data, if you leave a computer with access to your server out in the open, someone could sit down at the keyboard, download all of the securely transferred data and steal it. Public key encryption won't protect against that and, as such, it's only a part of an overall security system. END! SOURCE IS SECURED for links send me your Digital Certificate.