Components of Public Key Infrastructure

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Components of Public Key Infrastructure:

Using asymmetric key pairs is easy to apply however when expanded beyond a small community there are potential vulnerabilities. If a private key is compromised, it is difficult to locate and remove that key.

The security infrastructure developed to address these problems is known as a public key infrastructure (PKI). PKI uses asymmetric key pairs and combines software, encryption technologies, and services to safeguard the security of communications RFC 2459 defines the X.509 PKI, which is the PKI defined for use on the Internet. This incorporates the use of certificates, certification authorities (CAs), certificate management tools, and certificate-enabled applications.

Components of a PKI: A PKI uses public key encryption technologies to bind public keys to their owners and to assist with safe distribution of keys across networks. PKI provides a range of services, technologies, protocols, and standards that allow the distribution and management of a strong and scalable information security system.

Setting up PKI will allow organizations to conduct business electronically with these assurances:

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?