Unit 4
Unit 4
Unit 4
PUBLIC KEY
INFRASTRUCTURE
Topics to cover
4.1 Public key infrastructures: basics, digital
certificates, certificate authorities, registration
authorities
• Public key infrastructure or PKI is the governing body behind issuing digital certificates.
It helps to protect confidential data and gives unique identities to users and systems. Thus,
it ensures security in communications.
• The public key infrastructure uses a pair of keys: the public key and the private key to
achieve security. The public keys are prone to attacks and thus an intact infrastructure is
needed to maintain them.
• Keeping the private key secret: Only the owner of a private key is authorized to use a
private key. It should thus remain out of reach of any other person.
• Assuring the public key: Public keys are in the open domain and can be publicly
accessed. When this extent of public accessibility, it becomes hard to know if a key is
correct and what it will be used for. The purpose of a public key must be explicitly
defined.
• PKI or public key infrastructure aims at achieving the assurance of public key.
DIGITAL CERTIFICATES 4
• Digital certificates are used for secure communication, using public key
cryptography, and digital signatures. The purpose of a PKI is to make sure
that the certificate can be trusted.
• There are two trust models used in practice: "Web of Trust" and central
"Certification Authority" based.
CERTIFICATE AUTHORITIES ( CA )
A CA issues and verifies certificates. This authority makes sure that the information in a
certificate is real and correct and it also digitally signs the certificate.
a PKI is an arrangement that binds public keys with respective identities of entities (like
people and organizations). The binding is established through a process of registration
and issuance of certificates at and by a certificate authority (CA).
REGISTRATION AUTHORITIES ( RA )
• https://support.microsoft.com/en-au/office/obtain-a-digital-certif
icate-and-create-a-digital-signature-e3d9d813-3305-]4164-a820-
2e063d86e512
OBTAINING DIGITAL CERTIFICATES 8
5. CA Verification:
The CA will verify the information in the CSR
6. Certificate Issuance:
You'll usually receive the certificate file, which may have extensions like .crt or .pem.
This command checks the signature of the certificate against the public key of the
CA. If the verification is successful, you'll see a message indicating that the
certificate is OK.