Public Key Infrastructure (PKI
Public Key Infrastructure (PKI
Public Key Infrastructure (PKI
1. HAMZA ILYAS…………………….1522
2. FUKISO FULASA………….….….1441
3. ABDELA AWOL……………….…...1434
4. FOZIYA ENDRIS…………………1513
5. JEMAL RAUF……………………..1521
6. HASEN MUHUMED…….………..1581
Submitted date:20/09/2013
content
1
What is PKI (Public Key Infrastructure)?
PKI (or Public Key Infrastructure) is the framework of encryption and cybersecurity that
protects communications between the server (your website) and the client (the users). Think about
all the information, people, and services that your team communicates and works with. PKI is
essential in building a trusted and secure business environment by being able to verify and exchange
data between various servers and users.
Through encryption and decryption, PKI is based on digital certificates that verify the identity of the
machines and/or users that ultimately proves the integrity of the transaction. As the number of
machines is increasing dramatically in today’s digital age, it’s important that our information is
trusted and protected against attacks.
Public Key Infrastructure (PKI) is a technology for authenticating users and devices in the
digital world. The basic idea is to have one or more trusted parties digitally sign documents
certifying that a particular cryptographic key belongs to a particular user or device. The key
can then be used as an identity for the user in digital networks.
The users and devices that have keys are often just called entities. In general, anything can
be associated with a key that it can use as its identity. Besides a user or device, it could be a
program, process, manufacturer, component, or something else. The purpose of a PKI is to
securely associate a key with an entity.
The trusted party signing the document associating the key with the device is called a
certificate authority (CA). The certificate authority also has a cryptographic key that it uses
for signing these documents. These documents are called certificates. Simply Certificate is
A signed instrument that empowers the Subject. It contains at least an Issuer and
a Subject. It can contain validity conditions, authorization and delegation information
In the real world, there are many certificate authorities, and most computers and web
browsers trust a hundred or so certificate authorities by default.
2
Public key infrastructure (PKI) governs the issuance of digital certificates to protect sensitive
data, provide unique digital identities for users, devices and applications and secure end-to-end
communications.
A public key infrastructure relies on digital signature technology, which uses public key
cryptography. The basic idea is that the secret key of each entity is only known by that
entity and is used for signing. This key is called the private key.
There is another key derived from it, called the public key, which is used for verifying
signatures but cannot be used to sign. This public key is made available to anyone, and is
typically included in the certificate document.
Today, organizations rely on PKI to manage security through encryption. Specifically, the most
common form of encryption used today involves a public key, which anyone can use to encrypt
a message, and a private key (also known as a secret key), which only one person should be able
to use to decrypt those messages. These keys can be used by people, devices, and applications.
PKI security first emerged in the 1990s to help govern encryption keys through the issuance and
management of digital certificates. These PKI certificates verify the owner of a private key and
the authenticity of that relationship going forward to help maintain security. The certificates are
akin to a driver’s license or passport for the digital world.
Common examples of PKI security today are SSL certificates on websites so that site visitors
know they’re sending information to the intended recipient, digital signatures, and authentication
for Internet of Things devices.
Public-key infrastructure (PKI) is the somewhat imprecise term used to describe the
system for issuing and managing certificates. Depending on your source, a PKI may be:
• software for managing digital certificates;
• a system of hardware, software, policies and people providing security assurances;
• the technology for securing the Internet;
• a worldwide system of digital ID cards.
3
How Does Public Key Infrastructure Work?
Okay, so now that you know what PKI is and how it relates to public key cryptography, it’s time
to talk about what it does and how it does it. There are a few key things to know about how PKI
works:
1. PKI authenticates you and your server. It allows your site users’ web browsers
to authenticate your server before connecting with it (so they can verify that they’re
connecting to a legitimate server). You can also use client certificates to limit access to
authenticated users. This gives you greater control over your network and other IT systems.
2. PKI facilitates encryption and decryption. PKI enables you to use digital
certificates and public encryption key pairs to encrypt and decrypt data or the transmission
channels you use to send it using the secure SSL/TLS protocol.
3. PKI ensures the integrity of your data. PKI lets users, their browsers or their
devices know whether the data you send has been tampered with.
Of course, doing any of these things requires the use of a public encryption keys that have strong
entropy. Every key is a randomly generated string of binary numbers — a random series of 1s
and 0s — that’s used to determine how plaintext transforms into ciphertext. So, when we talk
about entropy, what we mean is that the keys are generated with enough randomness that it
would take thousands — if not millions — of years for even modern supercomputers to guess.
4
What Are The Components Of Public Key Infrastructure?
So how does PKI authentication work?
There are three key components:
digital certificates,
certificate authority,
Registration authority.
By hosting these elements on a secure framework, a Public Key Infrastructure can protect the
identities involved as well as the private information used in situations where digital security is
necessary, such as smart card logins, SSL signatures, encrypted documents, and more. These
elements are vital in securing and communicating digital information and electronic transactions. We
go over these elements in more detail below.
1. Digital Certificates
PKI functions because of digital certificates. A digital certificate is like a driver’s license—it’s a form
of electronic identification for websites and organizations. Secure connections between two
communicating machines are made available through PKI because the identities of the two parties
can be verified by way of certificates.
So how do devices get these certificates? You can create your own certificates for internal
communications. If you would like certificates for a commercial site or something of a larger scale,
you can obtain a PKI digital certificate through a trusted third party issuer, called a Certificate
Authority.
2. Certificate Authority
A Certificate Authority (CA) is used to authenticate the digital identities of the users, which can
range from individuals to computer systems to servers. Certificate Authorities prevent falsified
entities and manage the life cycle of any given number of digital certificates within the system.
Much like the state government issuing you a license, certificate authorities vet the organizations
seeking certificates and issue one based on their findings. Just as someone trusts the validity of your
license based on the authority of the government, devices trust digital certificates based on the
authority of the issuing certificate authorities. This process is similar to how code signing works to
verify programs and downloads
5
3 . Registration Authority
Registration Authority (RA), which is authorized by the Certificate Authority to provide digital
certificates to users on a case-by-case basis. All of the certificates that are requested, received, and
revoked by both the Certificate Authority and the Registration Authority are stored in an encrypted
certificate database.
Certificate history and information is also kept on what is called a certificate store, which is usually
grounded on a specific computer and acts as a storage space for all memory relevant to the certificate
history, including issued certificates and private encryption keys. Google Wallet is a great example
of this.
6
There are two things PKI does to secure communications:
Authentication:-This ensures that the other party is the legitimate server/individual that
you’re trying to communicate with.
Encryption:-This makes sure that no other parties can read your communications.
1 Symmetrical Encryption
Symmetrical encryption protects the single private key that is generated upon the initial exchange
between parties—the digital handshake, if you will. This secret key must be passed from one party to
another in order for all parties involved to encrypt and decrypt the information that was exchanged.
This secret key can be in the form of a password, or it can be a series of random numbers or letters
generated by a random number generator (RNG).
If any one’s key is compromised, all keys need to be replaced
7
2. Asymmetric Encryption
Asymmetric encryption is fairly new to the game and you may know it better as “public key
cryptography.” Asymmetric encryption uses two keys, one public and one private. The public key
encrypts and the private key decrypts.
It allows you to create a public key for the party who is reporting to you, so that they may encrypt
their incoming information, after which you will be able to decrypt the information with a private
key.
Public-Key Cryptography is an encryption scheme that uses mathematically related, but not
identical keys.
Information encrypted with the public key can only be decrypted using the private key.
When we talk about data states, we aren’t talking about locations. There are three main states of data —
data in transit, data at rest, and data in use. For the purpose of this article, however, we’re just going to
talk about two of those data states here. Why? Because even though it’s possible to run computations on
encrypted data in use through something called homomorphic encryption (more specifically fully
homomorphic encryption), it’s a slow process that doesn’t scale well using current technologies. So,
we’re going to put a pin in that one for now and focus on the other two data states. Regardless of whether
or not you know it, encryption is in use all around you to secure data in transit and data at rest:
8
encrypting data in transit is when you use an SSL/TLS certificate to encrypt the communication
channel between a customer’s browser and your website’s server. This process ensures that users
connect to your site using a secure HTTPS connection instead of the insecure HTTP protocol.
Data at rest — Protecting data at rest encryption involves the use of file or device
encryption. A great example of encrypting data at rest is when you use an email signing
certificate to encrypt an email before hitting “send.”
This encrypts the data of the message itself (and any attachments) so that it even if
someone hacks your mail server, they can’t read the message if they don’t also have the
corresponding private key.
In this type of encryption, plaintext letters “shift” a set number of spaces depending on the secret
key. For example, the word “CERTIFICATE” becomes the ciphertext “IKXZOLOIGZK” if your
key is “6” because you’ve shifted each letter six spaces.
9
A basic
example of how a shift cipher (Caesar cipher) works.
Of course, this is encryption in one of its most basic forms. Modern cryptographic techniques
have come a long way from the days of ancient Rome where notes were delivered by horse or
boat. After all, we now have supercomputers and technology on our side to help us encrypt (and
decrypt) data, messages, and other sensitive information.
Has been signed by the true, authenticated individual or business, and that it
Don’t worry, we aren’t going to get into all of the specifics of hashing and checksums here.
Frankly, it’s too involved and we still have other things to talk about relating to how PKI works.
A wide variety of use cases exist for PKI. Some of the most common PKI use cases include:
10
SSL/TLS certificates to secure web browsing experiences and communications
Digital signatures on software
Restricted access to enterprise intranets and VPNs
Password-free Wi fi access based on device ownership
Email and data encryption
One of the most explosive uses for PKI that is just now taking off centers around
authenticating and securing a wide variety of IoT devices.
11
The higher the standard encryption, the better cryptic the public/private key pair is. An AES 256
certificate is a long length key that causes brute force attacks by would-be credential thieves
virtually impossible.
DIFFIE HELLMAN:
Diffie Hellman, also known as exponential key exchange, is a method of encryption that uses
numbers raised to specific powers that produce decryption keys on the basis of components that
are never directly shared, making it overwhelming for potential threats to penetrate.
The algorithm creates a mathematically complex encryption that is shared between two parties
over a secret communication over a public network so that they can allow an exchange of a
private encryption key.
DSA:
The DSA, or digital signature algorithm, is used to create digital signatures. DSA was created in
1991 by the National Institute of Standards and Technology and is the standard for government
agencies.
The pitfall of the DSA algorithm is that it can only do digital signatures and not public key
encryption. However, the advantage lies within the algorithms speed of producing a digital
signature.
12
The PKI Process
Now that we have a basic understanding of the elements of a PKI, we can see how exactly the
pieces fit together to provide a secure exchange of data.
First, Patrick sends his message using a hashing algorithm to create a fixed size hash of the
message. Once the hash has been created, Patrick can use his private key to sign the message,
creating a unique signature for the message being sent.
Patrick will encrypt the message with a one-time use symmetric key to overcome the problem of
key distribution. The symmetric session key is encrypted with Micah’s public key, ensuring that
Micah is the only person who can decrypt and use the symmetric session key.
Micah then decrypts the symmetric session key by using his private decryption key. He uses this
to decrypt the message and performs a new hash on the message to obtain a message digest.
Lastly, Patrick’s signed document is verified by using the original hash compared to the fresh
hash created by Micah. If the two match, the message is valid and is successfully sent.
13
Why is PKI so Important in Today’s Digital Age?
PKI is so important in today’s digital age because there are now millions of applications and
connected devices that require certification. Properly authenticating and maintaining certificates
for these technologies is essential to keeping our highly connected world secure. To fully
illustrate the importance of PKI in today’s digital age, let’s track its evolution since it first came
about in the mid-1990s.
reference
1. http://news.netcraft.com/archives/2015/05/13/counting-ssl-
2.certificates.htmlhttps://www.pentasecurity.com/blog/how-pki
3. work/https://www.thesslstore.com/blog/how-pki-
works/
4. Sullivan, Nick (10 July 2^014). "Introducing CFSSL - Cloudflare's PKI
toolkit". CloudFlare's Blog. CloudFlare. Retrieved 18 April 2018.
14
5. "Should We Abandon Digital Certificates, Or Learn to Use Them
Effectively?". Forbes.
15