PKI(Public Key Infrastructure)






The full name of PKI is Public Key Infrastructure. It is a group of processes, techniques and policies that provide public-key encryption and digital certificates.​

The main purpose of PKI is to create, manage and distribute certificates and keys.​

  • Users can encrypt and sign their data through public key infrastructure. So that a safe environment is created. And users can securely transfer their data to the Internet. And you can do money transfer, online shopping and communication safely.​
  • It verifies the identity of users, devices and services. Without PKI, we can encrypt any sensitive information and data, but we cannot authenticate other users and devices. Therefore, PKIs are very important for sending sensitive information via internet.​
  • The public key infrastructure provides services like authentication, non-repudiation, integrity, and confidentiality etc.​
Advantage of PKI:
  1. Through this we can reduce fraud (cheating) to a great extent because in the internet every person's identity is authenticated.​
  2. It provides privacy. So that no unwanted person can read the message.​
  3. It provides integrity of electronic communication. That is to assure that there is no tampering of any kind in the data.​
  4. It provides non-repudiation, that is, a person cannot say after sending data that he did not send that data.​
Disadvantage of PKI:
  1. It is not scalable.​
  2. This slows down the computer because it takes time to encrypt and decrypt the data.​
Elements of PKI:
  1. Certification Authorities (CA)​
  2. Registration Authority (RA)​
  3. Certificate Database ​
  4. Certificate Store​
                     A PKI is made from hardware, software, and policies. There are many elements in it, which is as follows: -​

Certification authorities (CA):- Certification authorities or CA is a service that issues and revoke certificates.​
The CA is that which authenticates the identity of things​
like computers, users, database, and network etc.​
When a user requests CA to issue a certificate, then the CA verifies that user then gives him the certificate. And in that certificate​.

Registration authority (RA):- It is also called subordinate CA. It authenticates and identifies the registration of digital certificates but it does not issue certificates. But in special circumstances it can issue certificate with permission of CA.​

Certificate Database:- It stores all the incoming requests for certificates and stores the information of the abstract certificate issued by CA or RA.​

Certificate Store:- It is located in the local computer and it stores private keys and certificates.​


Digital Certificate:
The digital certificate is like the heart of PKI. It also contains certificate​ information and public key.​
                                                For example, we can consider a digital certificate as an ID card. This id card is issue to the people so that they can prove their identity. The digital certificate also does the same in the electronic world. But there is a difference. The digital certificate also does the same in the electronic world. But there is a difference. Digital certificate is not only issue to the people but it is also issued to all those who need to prove their identity in computers, software and all things in the electronic world.​


Needs of PKI:

  1. First of all, we need to understand that the function of encryption is to ensure that data is transferred from one end to another in a secure manner.​
  2. One person encrypts the message with a public key and sends it to another person, the other person decrypt that message with their private key and​
  3. This encryption ensures that the transfer of data will be secure but it does not take responsibility that the public key is being used by its real owner. It may be that someone else is using the public key. That person can send any wrong and dangerous data using it.​
  4. If this public key is held by more than one person then the loss can be very high.​
  5. So PKI is used to avoid this problem. The PKI authenticates the identity of the owner of the public key reads that message.​
Thanks & Regards
Abhishek Pathak
+91-9621134014

abhishek9621134014@outlook.com






No comments:

Post a Comment

Computer Hardware_(A+) & Operating System with Networking

Microprocessor Motherboard About Operating System Create Bootable Pen Drive via Command Map Network Drive File Transfer Protocol in Windows ...