SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
TOPIC- PUBLIC KEY INFRASTRUCTURE
ADITYA NAMA
What is Public Key Infrastructure?
A public key infrastructure (PKI) allows users of the Internet and other public
networks to engage in secure communication, data exchange and money exchange.
This is done through public and private cryptographic key pairs provided by a
certificate authority.
There are different types of systems in a PKI:
• Private and Public Key Systems:
Private systems are symmetric cryptography and a public systems are asymmetric
cryptography. Currently, public key systems are the most common.
• Symmetric Encryption Systems:
The same key is used for both the processes of encryption and decryption.
• Asymmetric Encryption Systems:
A different key is used for each process. One key is the public key and the other key
is the private key. If something is encrypted with the public key, then decryption can
only be done with the private key. Alternatively, if something is encrypted with the
private key, then decryption must be done only with the public key.
It is a Framework that allows different it systems to have:
Throughout authentication with
JOHN SUZZANE
Secure Message
REQUEST
SENDS HER KEY TO JOHN TO
ENCRYPT THE MESSAGE
Encrypted Message
Can be distributed
to anyone
Uses to Decrypt
the message and
read it.
Let’s take an example: -
How do we really know that John really got Suzzane Public key?
Someone could have pretended to be Suzzane and send John her/his
Public key.
This is where Digital Certificates come in.
SUZZANE
What is Digital Certificate?
• They are the data packages that Identifies the entity.
What is Digital Certificates?
• The Digital Certificates itself is protected by
asymmetric cryptography
A trusted party known as Certificate Authority(CA) issues these
Digital Certificates to the person once a certain confidence in the person's
identity has been established by the CA.
PKI is also often backed up by legislation that is country specific. PKI
Might be present in
CA is both an organization as well as set of IT system that is:
• Responsible for Issuing
• Revoking
• It is often a third party organization that is trusted by all parties
participating in PKI.
REGISTRATION AUTHORITY(RA):
The Registration Authority (RA) is to evaluate the credentials and relevant
evidence that a person requesting a certificate is as claimed, certify for that
association of an electronic identification, public key and approves the
request for issuance of a certificate by a CA.
Organizations can also have their In-house CA system. Secure matrix PKI in a BOX
Appliance allows organizations to exactly do that with ease and at a lower cost.
Now take that example again of John and Suzzane but this time with PKI:
JOHN
SUZZANE
Secure Message
The Digital Certificate contains suzzane’s particulars, Public Key, the CAS
particulars and cryptographic data all the information needed to identify
the entity with a high level of confidence. The process will remain same but
this time John make sure that the Public Key came from Suzzane by
validating DC.
• It allows the choice of trust provider.
• Users maintain their own certificates, and certificate authentication involves exchange of
data between client and server only. This means that no third party authentication server
needs to be online. There is thus no limit to the number of users who can be supported
using PKI.
• PKI allows delegated trust. That is, a user who has obtained a certificate from a
recognized and trusted certificate authority can authenticate himself to a server the very
first time he connects to that server, without having previously been registered with the
system.
Advantages of the PKI:
Disadvantages of the PKI
• Computer has to work very hard to both encrypt and decrypt data using the system.
In applications where we need to work with large quantities of encrypted data on a
regular basis, the computational overhead means that public key systems can be
very slow.
• The certification authority may be get compromised, the criminal could issue false
certificates and fool people into sending data to the wrong place.
• However, once you receive that credit card data, if you leave a computer with
access to your server out in the open, someone could sit down at the keyboard,
download all of the securely transferred data and steal it. Public key encryption
won't protect against that and, as such, it's only a part of an overall security system.
END!
SOURCE IS SECURED
for links send me your Digital Certificate.
Public key infrastructure

More Related Content

PDF
Digital certificates & its importance
PPTX
Introduction to Public Key Infrastructure
PPT
Digital certificates
PPTX
public key infrastructure
PPT
authentication.ppt
PPT
PUBLIC KEY ENCRYPTION
PPT
6. cryptography
PPTX
Key management
Digital certificates & its importance
Introduction to Public Key Infrastructure
Digital certificates
public key infrastructure
authentication.ppt
PUBLIC KEY ENCRYPTION
6. cryptography
Key management

What's hot (20)

PPT
Keyloggers and Spywares
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
User authentication
 
PPT
Symmetric and Asymmetric Encryption.ppt
PPTX
Digital certificates
PDF
Public key Infrastructure (PKI)
PPTX
Fundamentals of Network security
PPTX
Steganography
PPTX
Password Cracking
PPTX
Tools and methods used in cybercrime
PPT
Symmetric & Asymmetric Cryptography
PPTX
Secret key cryptography
PPTX
Cryptography
PDF
Email Forensics
PPT
Secure Socket Layer
PPTX
Authentication
PDF
Introduction to Cryptography
PDF
Authentication techniques
PPTX
IP Spoofing
Keyloggers and Spywares
Network security (vulnerabilities, threats, and attacks)
User authentication
 
Symmetric and Asymmetric Encryption.ppt
Digital certificates
Public key Infrastructure (PKI)
Fundamentals of Network security
Steganography
Password Cracking
Tools and methods used in cybercrime
Symmetric & Asymmetric Cryptography
Secret key cryptography
Cryptography
Email Forensics
Secure Socket Layer
Authentication
Introduction to Cryptography
Authentication techniques
IP Spoofing
Ad

Similar to Public key infrastructure (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PDF
PUBLIC KEY INFRASTRUCTURE Network and network devices
PPT
NS Unit 3 AAR.ppt
PPT
Implementing Public-Key-Infrastructures
PPTX
Public Digital Identity as a Service
PPT
PKI_Applications digital certificate.ppt
PPTX
Digital certificates and information security
PPT
Public Key Infrastructure and Application_Applications.ppt
PDF
Everything you need to Know about PKI .pdf
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PDF
Data security for any organization by using public key infrastructure compone...
PDF
Data security for any organization by using public key infrastructure compone...
PPT
PKI and Applications
PDF
Iaetsd secure emails an integrity assured email
PPTX
Introduction to Public Key Infrastructure (PKI)
PDF
Digital certificate management v1 (Draft)
PDF
18CS2005 Cryptography and Network Security
PDF
Authentication and Authorization Models
PPTX
Unit 4 (Part II) - Authentication Framework for PKC.pptx
PPTX
Pki for dummies
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PUBLIC KEY INFRASTRUCTURE Network and network devices
NS Unit 3 AAR.ppt
Implementing Public-Key-Infrastructures
Public Digital Identity as a Service
PKI_Applications digital certificate.ppt
Digital certificates and information security
Public Key Infrastructure and Application_Applications.ppt
Everything you need to Know about PKI .pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
PKI and Applications
Iaetsd secure emails an integrity assured email
Introduction to Public Key Infrastructure (PKI)
Digital certificate management v1 (Draft)
18CS2005 Cryptography and Network Security
Authentication and Authorization Models
Unit 4 (Part II) - Authentication Framework for PKC.pptx
Pki for dummies
Ad

Recently uploaded (20)

PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
artificial intelligence overview of it and more
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Internet___Basics___Styled_ presentation
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
DOCX
Unit-3 cyber security network security of internet system
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
innovation process that make everything different.pptx
Sims 4 Historia para lo sims 4 para jugar
Paper PDF World Game (s) Great Redesign.pdf
artificial intelligence overview of it and more
The Internet -By the Numbers, Sri Lanka Edition
Tenda Login Guide: Access Your Router in 5 Easy Steps
Introuction about WHO-FIC in ICD-10.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Internet___Basics___Styled_ presentation
SASE Traffic Flow - ZTNA Connector-1.pdf
Unit-3 cyber security network security of internet system
international classification of diseases ICD-10 review PPT.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
Module 1 - Cyber Law and Ethics 101.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
Triggering QUIC, presented by Geoff Huston at IETF 123
PptxGenJS_Demo_Chart_20250317130215833.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
INTERNET------BASICS-------UPDATED PPT PRESENTATION
innovation process that make everything different.pptx

Public key infrastructure

  • 1. TOPIC- PUBLIC KEY INFRASTRUCTURE ADITYA NAMA
  • 2. What is Public Key Infrastructure? A public key infrastructure (PKI) allows users of the Internet and other public networks to engage in secure communication, data exchange and money exchange. This is done through public and private cryptographic key pairs provided by a certificate authority. There are different types of systems in a PKI: • Private and Public Key Systems: Private systems are symmetric cryptography and a public systems are asymmetric cryptography. Currently, public key systems are the most common. • Symmetric Encryption Systems: The same key is used for both the processes of encryption and decryption. • Asymmetric Encryption Systems: A different key is used for each process. One key is the public key and the other key is the private key. If something is encrypted with the public key, then decryption can only be done with the private key. Alternatively, if something is encrypted with the private key, then decryption must be done only with the public key.
  • 3. It is a Framework that allows different it systems to have: Throughout authentication with
  • 4. JOHN SUZZANE Secure Message REQUEST SENDS HER KEY TO JOHN TO ENCRYPT THE MESSAGE Encrypted Message Can be distributed to anyone Uses to Decrypt the message and read it. Let’s take an example: -
  • 5. How do we really know that John really got Suzzane Public key? Someone could have pretended to be Suzzane and send John her/his Public key. This is where Digital Certificates come in. SUZZANE
  • 6. What is Digital Certificate? • They are the data packages that Identifies the entity. What is Digital Certificates? • The Digital Certificates itself is protected by asymmetric cryptography A trusted party known as Certificate Authority(CA) issues these Digital Certificates to the person once a certain confidence in the person's identity has been established by the CA.
  • 7. PKI is also often backed up by legislation that is country specific. PKI Might be present in CA is both an organization as well as set of IT system that is: • Responsible for Issuing • Revoking • It is often a third party organization that is trusted by all parties participating in PKI. REGISTRATION AUTHORITY(RA): The Registration Authority (RA) is to evaluate the credentials and relevant evidence that a person requesting a certificate is as claimed, certify for that association of an electronic identification, public key and approves the request for issuance of a certificate by a CA.
  • 8. Organizations can also have their In-house CA system. Secure matrix PKI in a BOX Appliance allows organizations to exactly do that with ease and at a lower cost. Now take that example again of John and Suzzane but this time with PKI:
  • 9. JOHN SUZZANE Secure Message The Digital Certificate contains suzzane’s particulars, Public Key, the CAS particulars and cryptographic data all the information needed to identify the entity with a high level of confidence. The process will remain same but this time John make sure that the Public Key came from Suzzane by validating DC.
  • 10. • It allows the choice of trust provider. • Users maintain their own certificates, and certificate authentication involves exchange of data between client and server only. This means that no third party authentication server needs to be online. There is thus no limit to the number of users who can be supported using PKI. • PKI allows delegated trust. That is, a user who has obtained a certificate from a recognized and trusted certificate authority can authenticate himself to a server the very first time he connects to that server, without having previously been registered with the system. Advantages of the PKI: Disadvantages of the PKI • Computer has to work very hard to both encrypt and decrypt data using the system. In applications where we need to work with large quantities of encrypted data on a regular basis, the computational overhead means that public key systems can be very slow.
  • 11. • The certification authority may be get compromised, the criminal could issue false certificates and fool people into sending data to the wrong place. • However, once you receive that credit card data, if you leave a computer with access to your server out in the open, someone could sit down at the keyboard, download all of the securely transferred data and steal it. Public key encryption won't protect against that and, as such, it's only a part of an overall security system. END! SOURCE IS SECURED for links send me your Digital Certificate.