SlideShare a Scribd company logo
PKI x.509 (PKIX)
Public Key Infrastructure
Presenter: Rishab Acharya
TU Registration No : 7-2-2-723-2022
Bachelors in Information Management
Mechi Multiple Campus
01
02
03
04
Table of Contents PKI & X.509 (PKIX)
PKIX Architectural Model
PKIX Management Functions
Example of a Digital
Certificate
Demo: Creating Certificates
Future Trends
Conclusion
05
06
07
01 PKI & X.509 (PKIX)
What? A security framework using digital certificates.
Why? Ensures authentication, confidentiality, integrity, and non-repudiation.
When? Standardized in the 1980s and used widely today.
How? Uses Certificate Authorities (CAs) to issue and verify certificates.
Main Components
 CA (Certificate Authority)
 RA (Registration Authority)
 Repository (Certificate Database)
 End-User (You/Device)
 CRL (Certificate Revocation List)
PKI & X.509 (PKIX)
02
PKIX Management Functions
03
1. Registration (User identity verification)
2. Initialization (Setting up cryptographic keys)
3. Certification (Issuing certificates)
4. Key Pair Recovery (Retrieving lost keys)
5. Key Pair Update (Renewing keys)
6. Revocation Request (Invalidating a certificate)
7. Cross Certification (Trust between different PKIs)
Example of a Digital Certificate
 Issuer: Let’s Encrypt
 Subject: www.example.com
 Valid From: 2024-03-01
 Valid To: 2025-03-01
 Public Key: RSA 2048-bit
 Signature Algorithm: SHA-256
04
Demo: Creating Certificates
05
openssl req -new -key private_key.pem -out request.csr
openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:2048
openssl x509 -req -days 365 -in request.csr -signkey private_key.pem -out certificate.pem
openssl x509 -in certificate.pem -text -noout
Future Trends
06
⁂ Post-Quantum Cryptography (PQC)
Quantum computers threaten current encryption methods.
⁂ Automation in Certificate Management
Automated processes improve certificate lifecycle management.
⁂ Decentralized PKI (Blockchain-Based PKI)
Blockchain can provide tamper-proof, decentralized trust.
⁂ Zero Trust Security & PKI
PKI enables secure access and communication in Zero Trust models.
⁂ Decline of EV Certificates
EV certificates are becoming less relevant in browsers.
⁂ PKI for IoT (Internet of Things)
PKI secures the growing IoT ecosystem by authenticating devices.
Conclusion
07
PKIX and X.509 enable secure communication.
PKI infrastructure ensures confidentiality, integrity, and authentication.
Future of PKI is shaped by quantum-resistant cryptography and automation.
PKI adoption is critical for modern security practices.
PKI's role continues to grow in securing IoT devices and Zero Trust model
Presentation on Public Key Infrastructure x.509
Thank You!!!

More Related Content

PDF
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
PPT
Implementing Public-Key-Infrastructures
PDF
2010-03-30 Red Hat Identity Management, Certificate System Technical Overview
PPTX
EC PKI Training on-prem and cloud-based PKI
PDF
Ijarcet vol-2-issue-7-2307-2310
PDF
Ijarcet vol-2-issue-7-2307-2310
DOCX
PKI Concepts- What are the core components of a PKI- Briefly describe.docx
PDF
PUBLIC KEY INFRASTRUCTURE Network and network devices
Define PKI (Public Key Infrastructure) and list and discuss the type.pdf
Implementing Public-Key-Infrastructures
2010-03-30 Red Hat Identity Management, Certificate System Technical Overview
EC PKI Training on-prem and cloud-based PKI
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
PKI Concepts- What are the core components of a PKI- Briefly describe.docx
PUBLIC KEY INFRASTRUCTURE Network and network devices

Similar to Presentation on Public Key Infrastructure x.509 (20)

PDF
How EverTrust Horizon PKI Automation can help your business?
PPT
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
PDF
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PDF
eMCA Suite
PDF
www.ijerd.com
DOCX
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
PPTX
Create Your Own Serverless PKI with .NET & Azure Key Vault
PDF
iaetsd Robots in oil and gas refineries
PDF
Securing Your Resources with Short-Lived Certificates!
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PPTX
PKI-Architecture-Securing-the-Digital-World.pptx
PDF
Centralized TLS Certificates Management Using Vault PKI + Cert-Manager
PDF
Security aspects on blockchain white paper
PPTX
How to Install and Configure your own Identity Manager GE
PDF
How to Install & Configure Your Own Identity Manager GE
PPTX
Blockchain Defined Perimeter for Cloud Security
PDF
How to Secure Your Network with Kerberos Authentication | USCSI®
PDF
How to Secure Your Network with Kerberos Authentication | USCSI®
PDF
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
How EverTrust Horizon PKI Automation can help your business?
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
eMCA Suite
www.ijerd.com
Unveiling the Power of Cloud PKI Solutions_ A Secure Path to Modern Authentic...
Create Your Own Serverless PKI with .NET & Azure Key Vault
iaetsd Robots in oil and gas refineries
Securing Your Resources with Short-Lived Certificates!
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PKI-Architecture-Securing-the-Digital-World.pptx
Centralized TLS Certificates Management Using Vault PKI + Cert-Manager
Security aspects on blockchain white paper
How to Install and Configure your own Identity Manager GE
How to Install & Configure Your Own Identity Manager GE
Blockchain Defined Perimeter for Cloud Security
How to Secure Your Network with Kerberos Authentication | USCSI®
How to Secure Your Network with Kerberos Authentication | USCSI®
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
Ad

More from Rishab Acharya (10)

PDF
PROJECT : Nirbighna----From भीड To भरोसा
PDF
Online Queue Management System for Public Service Offices in Nepal [Focused i...
PDF
Lab Report on Artificial Intelligence...
PPT
Street Lights in Mechinagar Municipality
PDF
Lab Report of Foundation of Information Technology
PDF
Field Trip Report of Dairy Industry - Lucky Dairy Industry Pvt. Ltd.
PPT
Artificial Intelligence in Medical Sector [Healthcare, Bioinformatics & Medic...
PPTX
Introduction to epabx
DOC
Artificial intelligence
DOC
PLC CNTROLLED METRO TRAIN
PROJECT : Nirbighna----From भीड To भरोसा
Online Queue Management System for Public Service Offices in Nepal [Focused i...
Lab Report on Artificial Intelligence...
Street Lights in Mechinagar Municipality
Lab Report of Foundation of Information Technology
Field Trip Report of Dairy Industry - Lucky Dairy Industry Pvt. Ltd.
Artificial Intelligence in Medical Sector [Healthcare, Bioinformatics & Medic...
Introduction to epabx
Artificial intelligence
PLC CNTROLLED METRO TRAIN
Ad

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
RMMM.pdf make it easy to upload and study
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Cell Types and Its function , kingdom of life
PDF
Insiders guide to clinical Medicine.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Classroom Observation Tools for Teachers
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Microbial disease of the cardiovascular and lymphatic systems
RMMM.pdf make it easy to upload and study
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India
O5-L3 Freight Transport Ops (International) V1.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Complications of Minimal Access Surgery at WLH
Cell Types and Its function , kingdom of life
Insiders guide to clinical Medicine.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
TR - Agricultural Crops Production NC III.pdf
PPH.pptx obstetrics and gynecology in nursing
Classroom Observation Tools for Teachers
102 student loan defaulters named and shamed – Is someone you know on the list?
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pre independence Education in Inndia.pdf
VCE English Exam - Section C Student Revision Booklet
Supply Chain Operations Speaking Notes -ICLT Program

Presentation on Public Key Infrastructure x.509

  • 1. PKI x.509 (PKIX) Public Key Infrastructure Presenter: Rishab Acharya TU Registration No : 7-2-2-723-2022 Bachelors in Information Management Mechi Multiple Campus
  • 2. 01 02 03 04 Table of Contents PKI & X.509 (PKIX) PKIX Architectural Model PKIX Management Functions Example of a Digital Certificate Demo: Creating Certificates Future Trends Conclusion 05 06 07
  • 3. 01 PKI & X.509 (PKIX) What? A security framework using digital certificates. Why? Ensures authentication, confidentiality, integrity, and non-repudiation. When? Standardized in the 1980s and used widely today. How? Uses Certificate Authorities (CAs) to issue and verify certificates.
  • 4. Main Components  CA (Certificate Authority)  RA (Registration Authority)  Repository (Certificate Database)  End-User (You/Device)  CRL (Certificate Revocation List) PKI & X.509 (PKIX) 02
  • 5. PKIX Management Functions 03 1. Registration (User identity verification) 2. Initialization (Setting up cryptographic keys) 3. Certification (Issuing certificates) 4. Key Pair Recovery (Retrieving lost keys) 5. Key Pair Update (Renewing keys) 6. Revocation Request (Invalidating a certificate) 7. Cross Certification (Trust between different PKIs)
  • 6. Example of a Digital Certificate  Issuer: Let’s Encrypt  Subject: www.example.com  Valid From: 2024-03-01  Valid To: 2025-03-01  Public Key: RSA 2048-bit  Signature Algorithm: SHA-256 04
  • 7. Demo: Creating Certificates 05 openssl req -new -key private_key.pem -out request.csr openssl genpkey -algorithm RSA -out private_key.pem -pkeyopt rsa_keygen_bits:2048 openssl x509 -req -days 365 -in request.csr -signkey private_key.pem -out certificate.pem openssl x509 -in certificate.pem -text -noout
  • 8. Future Trends 06 ⁂ Post-Quantum Cryptography (PQC) Quantum computers threaten current encryption methods. ⁂ Automation in Certificate Management Automated processes improve certificate lifecycle management. ⁂ Decentralized PKI (Blockchain-Based PKI) Blockchain can provide tamper-proof, decentralized trust. ⁂ Zero Trust Security & PKI PKI enables secure access and communication in Zero Trust models. ⁂ Decline of EV Certificates EV certificates are becoming less relevant in browsers. ⁂ PKI for IoT (Internet of Things) PKI secures the growing IoT ecosystem by authenticating devices.
  • 9. Conclusion 07 PKIX and X.509 enable secure communication. PKI infrastructure ensures confidentiality, integrity, and authentication. Future of PKI is shaped by quantum-resistant cryptography and automation. PKI adoption is critical for modern security practices. PKI's role continues to grow in securing IoT devices and Zero Trust model

Editor's Notes

  • #1: International Telecommunication Union Standard (ITU)-> x.509
  • #2: We will first understand what PKI & X.509 are. Then, we will discuss PKIX architecture and management functions. We will see a real-world example of a digital certificate and learn how to generate an X.509 certificate using OpenSSL. Finally, we will explore future trends and conclude the discussion.
  • #3: PKI (Public Key Infrastructure) secures communication over networks. X.509 is a standard for digital certificates, widely used in TLS/SSL encryption. PKIX (Public Key Infrastructure X.509) extends X.509 to enhance security mechanisms. Certificate Authorities (CAs) issue certificates, enabling trusted communication over the internet.
  • #4: The Certificate Authority (CA) issues and revokes certificates. The Registration Authority (RA) verifies user identities. End Entities are the users or systems that use digital certificates. The Certificate Repository stores certificates for public verification. The Validation Authority checks if a certificate is valid or revoked.
  • #5: Registration: The RA verifies user identity before certificate issuance. Initialization: A cryptographic key pair is generated and assigned to a user. Certification: The CA issues a digital certificate to a verified user. Key Pair Recovery: Allows retrieval of lost encryption keys. Key Pair Update: Updates an expired or compromised key pair. Revocation Request: Cancels a certificate if it is compromised. Cross Certification: Enables trust between different PKI systems.
  • #6: A digital certificate verifies the identity of a website or user. The issuer is the trusted Certificate Authority (e.g., Let’s Encrypt, DigiCert). The subject is the entity that owns the certificate (e.g., a website). The validity period defines when the certificate is active. The public key is used for encryption. The signature algorithm ensures authenticity.
  • #7: Step 1: Generates a private key for encryption. Step 2: Creates a Certificate Signing Request (CSR), which contains user details. Step 3: Issues a self-signed certificate, valid for 1 year. Step 4: Verifies the generated certificate details.
  • #8: 1. Post-Quantum Cryptography (PQC) Threat: Quantum computers may break existing encryption methods like RSA and ECC. What’s changing: Researchers are developing quantum-resistant algorithms. Impact: PKI will transition to quantum-safe encryption to withstand quantum computing. 2. Automation in Certificate Management Why? Manual certificate management is error-prone and time-consuming. What’s changing: Automated tools like ACME streamline certificate issuance and renewal. Impact: Increased efficiency and fewer certificate expirations in large enterprises. 3. Decentralized PKI (Blockchain-Based PKI) Why? Traditional PKI is centralized and vulnerable to single points of failure. What’s changing: Blockchain offers a decentralized, tamper-proof trust model. Impact: Increased security and transparency in certificate management. 4. Zero Trust Security & PKI Why? The traditional security perimeter is becoming obsolete in modern IT environments. What’s changing: PKI becomes central to Zero Trust frameworks, verifying every request. Impact: Device authentication and encryption will be vital for secure communication. 5. Decline of EV Certificates Why? Extended Validation (EV) certificates display company names but add no extra security. What’s changing: Browsers are removing the EV certificate visual indicators. Impact: The trend shifts towards Domain Validation (DV) and Organization Validation (OV) certificates. 6. PKI for IoT (Internet of Things) Why? IoT devices are growing rapidly, creating new security risks. What’s changing: PKI will be used to authenticate IoT devices and secure communications. Impact: PKI will play a crucial role in securing smart homes, medical devices, and other IoT systems.
  • #9: PKIX and X.509 enable secure communication PKI provides a reliable system for ensuring secure digital communications through encryption and digital certificates. The X.509 standard defines how digital certificates should be structured and validated in PKI environments. PKI infrastructure ensures confidentiality, integrity, and authentication Through its core components, PKI ensures that data is confidential, untampered, and authentically verified. Digital certificates and public/private key pairs serve as the foundation for securing data. Future of PKI is shaped by quantum-resistant cryptography and automation As we face the threat of quantum computing, post-quantum cryptography (PQC) will play a pivotal role in protecting future data. Automation will make certificate management easier, reducing human error and increasing security in complex environments. PKI adoption is critical for modern security practices Businesses and governments alike must adopt PKI to ensure secure transactions, especially in cloud services, remote work, and IoT security. It is also a vital part of a Zero Trust security framework that emphasizes verifying every access attempt. PKI's role continues to grow in securing IoT devices and Zero Trust models As the IoT landscape expands, PKI will be increasingly used to authenticate millions of devices securely. Zero Trust models depend heavily on PKI for device authentication, secure communication, and end-to-end encryption.