Abstract

As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users. In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons. Also we discuss current implementations, risk and challenges of PKIs.

Highlights

  • The demand for securing communications is increasing dramatically day by day

  • Lightweight Public Key Infrastructure (LPKI) has a compact compatibility with PKIX infrastructure since the certificates in both of them are based on the format of the X.509v3 certificates

  • Public key infrastructure (PKI) provides a level of trust between individuals, as mentioned in the previous section, the attacker can access the private key of someone, and he or she can generate messages signed by the key holder

Read more

Summary

Introduction

The demand for securing communications is increasing dramatically day by day. Along with this demand, more techniques have been proposed to achieve the maximum security. First one is called private key or symmetric cryptography; it can be applied really fast but the key is hard to be managed since there is just one key each user. Despite this issue, it still plays a role in the most encryption systems. Other kind of cryptography is proposed to overcome this issue under the name of public key or asymmetric cryptography where each user is provided with a pair of keys: public and private keys.

PKI Overview
PKI’s Component and Operation
Well Known PKIs
Current Implementations of PKI
Risk and Challenges of PKI
Private Key Protection
Non-Repudiation in PKI
Open PKI Liability Risks
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call