Public-key infrastructure
A public-key infrastructure (PKI)
is a set of hardware, software, people, policies, and procedures needed
to create, manage, distribute, use, store, and revoke digital
certificates.
In cryptography, a PKI is an arrangement
that binds public keys with respective user identities by means of a
certificate authority (CA).
The user identity must be unique within each CA domain. The binding is
established through the registration and issuance process, which,
depending on the level of assurance the binding has, may be carried out
by software at a CA, or under human supervision. The PKI role that
assures this binding is called the Registration Authority (RA). The RA ensures that the public key is bound to the individual to which it is assigned in a way that ensures non-repudiation.
Certificate authorities
The primary role of the CA is to digitally sign and publish the
public key bound to a given user. This is done using the CA's own
private key, so that trust in the user key relies on one's trust in the
validity of the CA's key. The mechanism that binds keys to users is
called the Registration Authority (RA), which may or may not be separate
from the CA. The key-user binding is established, depending on the
level of assurance the binding has, by software or under human
supervision.
The term trusted third party (TTP) may also be used for certificate authority (CA). Moreover, PKI is itself often used as a synonym for a CA implementation.
Temporary certificates & single sign-on
This approach involves a server that acts as an online certificate authority within a single sign-on
system. A single sign-on server will issue digital certificates into
the client system, but never stores them. Users can execute programs,
etc. with the temporary certificate. It is common to find this solution
variety with x.509-based certificates
Web of trust
nice
ReplyDeleteSo far I have read so many articles that share information about this infrastructure but this is the best detail out of all. You do have shared so many tutorials explaining different concepts on your blog. Thanks for putting your efforts.
ReplyDeletepublic key infrastructure