SlideShare a Scribd company logo
1 of 14
Download to read offline
PUBLIC KEY
INFRASTRUCTURE
Mohd Sahil Hussain - 2021UIN3344
Hariom Kumar - 2021UIN3363
Topics Covered
Introduction
What is PKI
Why PKI is so important in Digital age
The Role of Digital Certificates in PKI
Role of Certification Authority in PKI
X.509
Duties of PKI
Common challenges that PKI solves
Conclusion
Introduction
Both symmetric and asymmetric encryption have one major challenge: How do you know
that the public key you received actually belongs to the person you think it does?
Even with asymmetric encryption, the risk of the “man in the middle” exists. For example,
what if someone intercepted Bob’s public key, made his own private key, and then
generated a new public key for Alice? In this case, Alice would encrypt messages for Bob,
the man in the middle could decrypt them, change them and then re-encrypt them and
neither Alice nor Bob would be any wiser.
PKI resolves this challenge by issuing and governing digital certificates that confirm the
identity of people, devices or applications that own private keys and the corresponding
public keys. In short, PKI assigns identities to keys so that recipients can accurately verify
the owners. This verification gives users confidence that if they send an encrypted
message to that person (or device), the intended recipient is the one who will actually read
it and not anyone else who may be sitting as a “man in the middle.”
Let’s understand what is PKI
Today, organizations rely on PKI to manage security
through encryption. Specifically, the most common form
of encryption used today involves a public key, which
anyone can use to encrypt a message, and a private key
(also known as a secret key), which only one person
should be able to use to decrypt those messages. These
keys can be used by people, devices, and applications.
PKI security first emerged in the 1990s to help govern
encryption keys through the issuance and management
of digital certificates. These PKI certificates verify the
owner of a private key and the authenticity of that
relationship going forward to help maintain security.
Public Key Infrastructure is a model for creating, distributing and revoking certificates
based on X.509(PKIX)
Public Key Infrastructure
Public key management requires :
Keeping the private key secret: Only the owner of a
private key is authorized to use a private key. It should
thus remain out of reach of any other person.
Assuring the public key: Public keys are in the open
domain and can be publicly accessed. When this extent
of public accessibility, it becomes hard to know if a key is
correct and what it will be used for. The purpose of a
public key must be explicitly defined.
PKI or public key infrastructure aims at achieving the
assurance of public key.
Why is PKI so Important in
Today’s Digital Age?
PKI is a cornerstone of modern digital security, providing a
framework for encrypting data, verifying identities, and
ensuring the integrity of communications. Through
cryptographic techniques, PKI enables secure transactions,
protects sensitive information, and facilitates
authentication in various online interactions. It supports
essential security protocols like SSL/TLS for web encryption
and S/MIME for email security, while also enabling digital
signatures for non-repudiation. PKI's hierarchical trust
model, upheld by trusted certificate authorities, establishes
the foundation for secure communication channels. In
summary, PKI plays a crucial role in fostering trust and
security in today's interconnected digital landscape.
Public Key Infrastructure
Public key infrastructure affirms the usage of a public key. PKI
identifies a public key along with its purpose. It usually
consists of the following components:
A digital certificate also called a public key certificate
Private Key tokens
Registration authority
Certification authority
CMS or Certification management system
PKI governs encryption keys by issuing and managing digital
certificates. Digital certificates are also called X.509
certificates and PKI certificates.
However, you refer to them, a digital certificate has these
qualities:
Is an electronic equivalent of a driver’s license or
passport
Contains information about an individual or entity
Is issued from a trusted third party
Contains information that can prove its authenticity
Can be traced back to the issuer
Has an expiration date
Is presented to someone (or something) for validation
The Role of Digital Certificates in PKI
Role of Certification Authority in PKI
Certification Authority(CA): CA binds a public key to an
entity and issues a certificate.
The CA has well known public key itself that cannot be
forged.
CA checks the persons identification(using persons ID
along with other proof).
It asks for person’s public key and writes it on the
certificate.
To prevent the certificate itself from being forged, the CA
signs the certificate with its private key.
Now person can share the signed certificate. Anyone who
wants Bob’s public key access the signed certificate and
uses the center’s public key to extract receiver’s public key
X.509
PKI is based on X.509, So Lets understand what is X.509
X.509 is a digital certificate that is built on top of a widely trusted standard known as
ITU or International Telecommunication Union X.509 standard, in which the format of
PKI certificates is defined.
Although CA has solved the problem of public-key fraud, but it also created one
problem that each certificate may have a different format.
One certificate may have the public key in one format and another in a different
format.
To remove this issue, the ITU has designed X.509.
X.509 is a way to describe the certificate in a structured way.
Duties of PKI
Certificates issuing, renewal, and
revocation
Key’s storage and update
Providing services to other
protocols
Providing access control
Common Challenges that PKI Solves?
One of the most explosive uses for PKI that is just now
taking off centers around authenticating and securing a wide
variety of IoT devices. These use cases span across
industries, as any connected device no matter how
innocuous it may seem requires security in this day and age.
For instance, The Home Depot data breach first started
because hackers were able to access the retailer’s point of
sale system by getting onto the network posing as an
unauthenticated HVAC unit.
Some of the most compelling PKI use cases today center
around the IoT. Auto manufacturers and medical device
manufacturers are two prime examples of industries
currently introducing PKI for IoT devices.
Conclusion
PKI helps secure our digital world by protecting
sensitive data and communications and verifying digital
identities. And as the number of connected devices and
applications explodes, this security continues to grow in
importance.
For enterprises, in particular, introducing PKI is critical —
but it’s also only the first step. Building and maintaining
a best practice PKI program that manages millions of
digital certificates isn’t easy, but that’s the challenge
facing today’s enterprises.
Mohd Sahil Hussain - 2021UIN3344
Hariom Kumar - 2021UIN3363

More Related Content

Similar to PUBLIC KEY INFRASTRUCTURE Network and network devices

PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaDrysign By Exela
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docxdurantheseldine
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2dP2PSystem
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...Arab Federation for Digital Economy
 
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...Signer.Digital
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Brian Spector
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modiMohit Modi
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalBrendan Sweeney
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization ModelsCSCJournals
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Testkhant14
 
technology
technologytechnology
technologynomber8
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Editor IJARCET
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Editor IJARCET
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesSymantec
 

Similar to PUBLIC KEY INFRASTRUCTURE Network and network devices (20)

PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
133IEEE Network • NovemberDecember 2020 0890-804420$25.00 ©.docx
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
sweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposalsweeney_brendan-css527-20141118-research_proposal
sweeney_brendan-css527-20141118-research_proposal
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
 
Computer Security Test
Computer Security TestComputer Security Test
Computer Security Test
 
technology
technologytechnology
technology
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

PUBLIC KEY INFRASTRUCTURE Network and network devices

  • 1. PUBLIC KEY INFRASTRUCTURE Mohd Sahil Hussain - 2021UIN3344 Hariom Kumar - 2021UIN3363
  • 2. Topics Covered Introduction What is PKI Why PKI is so important in Digital age The Role of Digital Certificates in PKI Role of Certification Authority in PKI X.509 Duties of PKI Common challenges that PKI solves Conclusion
  • 3. Introduction Both symmetric and asymmetric encryption have one major challenge: How do you know that the public key you received actually belongs to the person you think it does? Even with asymmetric encryption, the risk of the “man in the middle” exists. For example, what if someone intercepted Bob’s public key, made his own private key, and then generated a new public key for Alice? In this case, Alice would encrypt messages for Bob, the man in the middle could decrypt them, change them and then re-encrypt them and neither Alice nor Bob would be any wiser. PKI resolves this challenge by issuing and governing digital certificates that confirm the identity of people, devices or applications that own private keys and the corresponding public keys. In short, PKI assigns identities to keys so that recipients can accurately verify the owners. This verification gives users confidence that if they send an encrypted message to that person (or device), the intended recipient is the one who will actually read it and not anyone else who may be sitting as a “man in the middle.”
  • 4. Let’s understand what is PKI Today, organizations rely on PKI to manage security through encryption. Specifically, the most common form of encryption used today involves a public key, which anyone can use to encrypt a message, and a private key (also known as a secret key), which only one person should be able to use to decrypt those messages. These keys can be used by people, devices, and applications. PKI security first emerged in the 1990s to help govern encryption keys through the issuance and management of digital certificates. These PKI certificates verify the owner of a private key and the authenticity of that relationship going forward to help maintain security. Public Key Infrastructure is a model for creating, distributing and revoking certificates based on X.509(PKIX)
  • 5. Public Key Infrastructure Public key management requires : Keeping the private key secret: Only the owner of a private key is authorized to use a private key. It should thus remain out of reach of any other person. Assuring the public key: Public keys are in the open domain and can be publicly accessed. When this extent of public accessibility, it becomes hard to know if a key is correct and what it will be used for. The purpose of a public key must be explicitly defined. PKI or public key infrastructure aims at achieving the assurance of public key.
  • 6. Why is PKI so Important in Today’s Digital Age? PKI is a cornerstone of modern digital security, providing a framework for encrypting data, verifying identities, and ensuring the integrity of communications. Through cryptographic techniques, PKI enables secure transactions, protects sensitive information, and facilitates authentication in various online interactions. It supports essential security protocols like SSL/TLS for web encryption and S/MIME for email security, while also enabling digital signatures for non-repudiation. PKI's hierarchical trust model, upheld by trusted certificate authorities, establishes the foundation for secure communication channels. In summary, PKI plays a crucial role in fostering trust and security in today's interconnected digital landscape.
  • 7. Public Key Infrastructure Public key infrastructure affirms the usage of a public key. PKI identifies a public key along with its purpose. It usually consists of the following components: A digital certificate also called a public key certificate Private Key tokens Registration authority Certification authority CMS or Certification management system
  • 8. PKI governs encryption keys by issuing and managing digital certificates. Digital certificates are also called X.509 certificates and PKI certificates. However, you refer to them, a digital certificate has these qualities: Is an electronic equivalent of a driver’s license or passport Contains information about an individual or entity Is issued from a trusted third party Contains information that can prove its authenticity Can be traced back to the issuer Has an expiration date Is presented to someone (or something) for validation The Role of Digital Certificates in PKI
  • 9. Role of Certification Authority in PKI Certification Authority(CA): CA binds a public key to an entity and issues a certificate. The CA has well known public key itself that cannot be forged. CA checks the persons identification(using persons ID along with other proof). It asks for person’s public key and writes it on the certificate. To prevent the certificate itself from being forged, the CA signs the certificate with its private key. Now person can share the signed certificate. Anyone who wants Bob’s public key access the signed certificate and uses the center’s public key to extract receiver’s public key
  • 10. X.509 PKI is based on X.509, So Lets understand what is X.509 X.509 is a digital certificate that is built on top of a widely trusted standard known as ITU or International Telecommunication Union X.509 standard, in which the format of PKI certificates is defined. Although CA has solved the problem of public-key fraud, but it also created one problem that each certificate may have a different format. One certificate may have the public key in one format and another in a different format. To remove this issue, the ITU has designed X.509. X.509 is a way to describe the certificate in a structured way.
  • 11. Duties of PKI Certificates issuing, renewal, and revocation Key’s storage and update Providing services to other protocols Providing access control
  • 12. Common Challenges that PKI Solves? One of the most explosive uses for PKI that is just now taking off centers around authenticating and securing a wide variety of IoT devices. These use cases span across industries, as any connected device no matter how innocuous it may seem requires security in this day and age. For instance, The Home Depot data breach first started because hackers were able to access the retailer’s point of sale system by getting onto the network posing as an unauthenticated HVAC unit. Some of the most compelling PKI use cases today center around the IoT. Auto manufacturers and medical device manufacturers are two prime examples of industries currently introducing PKI for IoT devices.
  • 13. Conclusion PKI helps secure our digital world by protecting sensitive data and communications and verifying digital identities. And as the number of connected devices and applications explodes, this security continues to grow in importance. For enterprises, in particular, introducing PKI is critical — but it’s also only the first step. Building and maintaining a best practice PKI program that manages millions of digital certificates isn’t easy, but that’s the challenge facing today’s enterprises.
  • 14. Mohd Sahil Hussain - 2021UIN3344 Hariom Kumar - 2021UIN3363