Public Key Infrastructure(PKI)

In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through the registration and issuance process, which, depending on the level of assurance the binding has, may be carried out by software at a CA, or under human supervision. The PKI role that assures this binding is called the Registration Authority (RA) . For each user, the user identity, the public key, their binding, validity conditions and other attributes are made unforgeable in public key certificates issued by the CA.

The term trusted third party (TTP) may also be used for certificate authority (CA). The term PKI is sometimes erroneously used to denote public key algorithms, which do not require the use of a CA.

Comments

Sepitta Meshan said…

Very informative knowledge found. Keeping sharing such knowledgable posts. As PKI ensures security of electronic transformation of information by using different symmetric and asymmetric encryption techniques and assigning unique identities to each IoT endpoints. To make yourselves safe from cyber attacks, it is also essential to be updated with the latest security tools and hacking techniques. Mstweaks keeps you updated with all the latest technological advancements. For any queries or discussion on any topic related to information security, contact us.

Popular posts from this blog

L2TPv3 Enables Layer 2 Services for IP Networks

TCP/IP 明確擁塞通知 (ECN)

Q-in-Q(Dot1Q Tunnel) Sample Configuration