21-09-2017, 01:18 PM
A public key infrastructure (PKI) is a set of roles, policies, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and manage public key encryption. The purpose of a PKI is to facilitate secure electronic transfer of information for a number of network activities such as e-commerce, Internet banking and confidential e-mail. It is required for activities where simple passwords are an inadequate authentication method and require more rigorous testing to confirm the identity of the parties involved in the communication and to validate the information being transferred.
In cryptography, a PKI is an arrangement that links public keys with respective identities of entities (such as individuals and organizations). Linkage is established through a process of registration and issuance of certificates in and by a certification authority (CA). Depending on the level of binding of the binding, this can be carried out by an automated process or under human supervision.
The PKI role that ensures a valid and correct record is called the record authority (RA). An RA is responsible for accepting digital certificate requests and authenticating the requesting entity. In a Microsoft PKI, a registrar authority is generally referred to as subordinate CA.
An entity must be uniquely identifiable within each domain of the CA based on information about that entity. A third party validation authority (VA) may provide this entity information on behalf of the CA.
The main function of the CA is to digitally sign and publish the public key linked to a particular user. This is done using the private key of the CA itself, so that trust in the user key depends on trust in the validity of the CA key. When the certification authority is a third party independent of the user and the system, it is called the Registration Authority (RA), which may or may not be separate from the issuing authority. level of security that has the link, by software or under human supervision. The third term of trust (TTP) can also be used for the certification authority (CA). On the other hand, PKI is often used as a synonym for an AC application.
In cryptography, a PKI is an arrangement that links public keys with respective identities of entities (such as individuals and organizations). Linkage is established through a process of registration and issuance of certificates in and by a certification authority (CA). Depending on the level of binding of the binding, this can be carried out by an automated process or under human supervision.
The PKI role that ensures a valid and correct record is called the record authority (RA). An RA is responsible for accepting digital certificate requests and authenticating the requesting entity. In a Microsoft PKI, a registrar authority is generally referred to as subordinate CA.
An entity must be uniquely identifiable within each domain of the CA based on information about that entity. A third party validation authority (VA) may provide this entity information on behalf of the CA.
The main function of the CA is to digitally sign and publish the public key linked to a particular user. This is done using the private key of the CA itself, so that trust in the user key depends on trust in the validity of the CA key. When the certification authority is a third party independent of the user and the system, it is called the Registration Authority (RA), which may or may not be separate from the issuing authority. level of security that has the link, by software or under human supervision. The third term of trust (TTP) can also be used for the certification authority (CA). On the other hand, PKI is often used as a synonym for an AC application.