Public Key Infrastructure
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:01
Hello there. Welcome to protecting data. My name is Alberto Garcia, and I will be guiding you through this process. Key management is a challenge.
00:12
A bullet Key infrastructure or p k. I support the distribution to occasion. I'm verification off. Public keys used for public key encryption
00:24
enables linking off identities with public E certificates.
00:29
A bouquet infrastructure enables users on systems to securely exchange data over the intimate. I'm verified the legitimacy off certificate holding entities so shots, Web servers or their authenticated servers on individuals.
00:49
The boutique infrastructure enables users to authenticate the certificate holders as well as two movie. It's the process off the certificates of location you feel cryptographic algorithms to secure the process.
01:03
Brick infrastructures that difficult include a bullet key used for encryption on cryptographic authentication, off data santo or from the entity that was issued the certificates.
01:18
Other information included in a P K I certificates includes identifying information about the certificate holder
01:27
about the P k I that issue the certificate on other data, including the certificates Creation date on validity period
01:38
without probably key infrastructure. Sensitive information can still be increased. It insuring confidentiality on exchange between twenties.
01:48
But there will be no assurance off the identity off the other party.
01:53
Any form off sensitive state exchanged over the Internet is reliance on the public infrastructure for enabling the use off. Probably kick photography because the public infrastructure enables the authenticated exchange off. Probably keys.
02:12
Okay, but what is poorly? Key infrastructure?
02:15
The pool key infrastructure is the set off hard word software. All this is processes proceed. Use required to create mindless distribute use. Store on revoked details are difficult. I'm fully keys.
02:32
The B k I is the foundation that enables the use off technologies, socials, Diggle signatures and increase Shal across large use of populations.
02:45
Public infrastructures delivered the elements essentials for a secure and trusted business environment for e commerce. Under growing Internet off things,
02:55
public infrastructures help establish the identity off people. Devices on service is enabling controlled access to system under sources. Protection off data on a contributory introductions
03:12
Next generation These this applications are becoming more reliance on public infrastructure
03:17
technology. Toe Girl T Hi assurance. Possible being business mortars are becoming more dependent on electron interactions requiring online in authentication on compliance with a stricter the prosecutor. It's regulations,
03:35
a typical public infrastructure includes the following key elements.
03:42
A trusted Barry provides the route off trust for all P k I certificates on provide services that can be used to authenticate Dhiren *** off in the visas. Computers on other entities usually known our certificate authorities.
03:59
These entities provide assurance about the Paris identified
04:03
in a P. K I certificates
04:05
is certificate authority maintain its own route. See a for use only by the sea, eh?
04:14
Country station authority or are a often calls Coordinate. See a issues B k I certificates. The re station authority is certified by a route. See a unauthorized issue certificates for a specific uses for minute by the root
04:33
certificated that always stores information about issued certificates. You know the simplest certificate itself. The diaries includes by literally period on the starters off H E K. I certificate
04:48
certificate of location is known by updating these dynamics, which must be queried so authenticate any day that digitally signed or in Crete, it with the secret key or the certificate holder. A certificate store, which is usually parliamentary store on a computer,
05:08
come out for human toned
05:10
in memory for applications that do not acquire. This is difficult to be stalled permanently. The certificate store in Abel's programs running on the system to access the store's a difficult certificate. Application lists on certificate. Ross lists a certificate authority.
05:28
It's just the certificates to entities and individuals.
05:32
Obstacles may be required to verify their identity with increasing the grace off assurance forces difficult with increasing level off valuation.
05:43
The issue. See a digitally signed certificates. Using is secret Key
05:48
is polic e Andi. Nothing natural Are made available for authentication. Toe all interested parties in a self sign. See a certificate certificate. Authorities use that rusted root certificates to create a chain off trust.
06:06
Many food certificates are embedded in Web browsers, so they have built in trust off those CS What's there? Burst on email kinds,
06:17
and I was so smartphone on many other types of hardware. I'm so far, including Internet of Things. Devices also support public infrastructure and contain trusted root certificates. Front. They may your certificate authorities.
06:34
Public infrastructures provide a framework that the name was cryptographic the prosecutor Lee Technologies. So she has details, certificates on signatures, Toby effectively deployed on a mass scale
06:49
along with other entities or interviewed Los Feliz Key details. Certificates contain information about the algorithm used to create the signature of the person or entity identified. The digital seem natural off the CIA that verified the subject data on issue The certificate.
07:09
Also the poor, puts off the public encryption signatures on certificates signing as well as the day Strange doing which the certificates can be considered valid, while Beaky I certificates are used for implementing photography over Web on other Internet connections,
07:29
they're also used for other applications,
07:31
including into legal certification for co signing applications for authenticating the transactions on ball.
07:42
Public infrastructure provides a shave off trust so that identity is on a network can be very fight. However, Like anything, A B, K II is only a strong as its weakest link, although
07:58
a certificate authority is often referred toe *** trusted to parry shark arms in the security proceed, use off very C s house jeopardize trust in entire public infrastructure on which the Internet kills. If one certificate authority is compromised,
08:16
the security off the Kyle B. K II is at risk
08:20
on alternative approach tow. You think that's a difficult authority Toe 20 case Public information is decentralized Trust model called a Web off trust,
08:33
a concept used in pretty good privacy or PCP on other open TCP comparable systems.
08:41
Instead off relying solely on a higher key off the difficult authorities certificates are signed by other users to endorse the association off that Maliki with the person or entity listed in certificates.
08:58
Okay, here's a question for you
09:01
wish P k I component providers assurance about the parts identified in a P K I certificate. Is it a certificate? Authority will be frustration authority? Or maybe see sophisticate batteries or maybe D certificates? Or,
09:20
if you said, a you're correct
09:22
US A. Recession authority. Often calls were delayed. See a issue, speak air certificates,
09:28
a certificate, diaries, stores, information about issues that certificates and a certificate stores in labels programs running on the system. Tau access the store certificates
Up Next
Similar Content