What is Public Key Infrastructure?

 

In order to overcome online security threats, al large four cornerstones are noted for web security.  These are

Public Key Infrastructure or PKI comprises of a set of standards, protocols, schemes, and services that is designed to ensure the four cornerstones of online security.  There are different perceptions as to what PKI is.  Some refer to it as simply a trust hierarchy that comprises of highly trusted authorities (certificate authorities) that certify parties to transaction (usually the merchant).  For our purpose and as it is generally conceived, PKI includes a number of various other schemes and protocols that are designed to ensure comprehensive authentication, integrity, privacy and non-repudiation when communicating online.  It is believed that in order to ensure success and ubiquity of Electronic Commerce, parties to transactions need to feel that the four cornerstones of security are adhered to and as such PKI becomes the enabler of Electronic Commerce.

 

There is no single definition of PKI at the present time although efforts are being made to ensure a cohesive definition, and interoperability of the various schemes and definitions.  The protocol that brings all the above together to ensure all the security requirements is SSL.  SSL is considered to be the implementation of security.  There is also another suite of protocols that are developed and proposed by financial institutions to enable secure payment.  This suite is referred to as SET.

 

For more information also see:

http://webopedia.internet.com/TERM/P/PKI.html

http://csrc.ncsl.nist.gov/pki/

http://www.opengroup.org/public/tech/security/pki/cki/

http://www.opengroup.org/security/pki/

http://www.rsasecurity.com/rsalabs/faq/4-1-3-1.html

http://www.pki-page.org/

http://www.ficora.fi/englanti/tietoturva/julkinen.htm

http://www.bbs.no/engelske_nettsider/tillitstjenester/bankid_faq.htm

 

Why do we need a framework for public key security?

 

 

 

 

Test yourself by answering the questions below:

State each of the four functions of PKI where indicated.

 

  • Agreements shall not be broken later:..........................
    • It is done through use of ..........................
  • Knowing the parties to communication:........................
    • It is done through use of ............................
  • Changes to message during transmission are detectable: ......................
    • It is done though use of.....................
  • Messages are visible to non-other but the parties to communication:
    • It is done through use of.......................

 

What is the difference between authentication and confidentiality?

 

 

 

 

How do encryption, digital signature, and digital certificate differ?