Preview

Public Key Infrastructure

Powerful Essays
Open Document
Open Document
2320 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Public Key Infrastructure
Public Key Infrastructure
(PKI)

TS5130 System Development Theory and Practice

June 16, 2007

Table of Contents

Purpose and Function: 7
How PKI Works: 9

Table of Figures

Figure 1: Required Key and Certificate Management Services 8
Figure 2: How PKI Works 10

Abstract

This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.

Introduction

With today’s security threat of hackers, spammers and viruses infecting computers, PKI is an essential component of an overall security strategy that must work in concert with other security mechanisms, business practices, and risk management efforts to help protect vital information (Weise, 2001). The Internet isn’t the only area of security that needs PKI, e-mail systems need to incorporate a higher level of security through digital signatures and e-mail encryption within the work environment to ensure business information is exchanged between validated and trusted recipients.

History

Public Key Infrastructure (PKI) is simply the single most effective method for securing a public communications networks, and is used throughout the world for the transmission of sensitive data. Government agencies, the U.S. Army, Navy, Air force, financial and medical institutions use PKI to ensure their communications are protected and safe



References: Farrow, Rik. Private Key Infrastructure; or, why there is no Public Key Infrastructure. Retrieved May 1, 2007 from: http://www.spinit.com/Network/net0903.html Miller, Jason. GCN Staff (2006, November). PKI gets shot in the arm from HSPD-12. Government Computer News, page 7. Entrust. (2006). Securing Digital Identities & Information. What is a PKI? Retrieved May 1, 2007 from: http://www.entrust.com/pki.htm?source=overture Weise, Joel. Sun Microsystems (August 2001) Public Key Infrastructure Overview. Retrieved May 28, 2007 from: www.sun.com/blueprints Unknown Author. Public Key Encryption and Public key Infrastructure – Explained. Retrieved May 1, 2007 from: https://www.safe-mail.net/support/eng/help/protectsecure/pki.html Wikipedia, the free encyclopedia. (2007). Public Key Infrastructure. Retrieved May 1, 2007 from: http://en.wikipedia.org/wiki/Public_key_infrastructure Wikipedia, the free encyclopedia. (2007). Digital Signature. Retrieved May 1, 2007 from: http://en.wikipedia.org/wiki/Digital_signature Unknown Author. Public Key Encryption and Public key Infrastructure – Explained. Retrieved May 1, 2007 from: https://www.safe-mail.net/support/eng/help/protectsecure/pki.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    Designing CA infrastructure – establishing a framework of linked CAs that are responsible for issuing, validating, renewing and revoking certificates as needed.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    2. We have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept we executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows us to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Explain the purpose of a Public Key Infrastructure (PKI) and give an example of how you would implement it in a large organization whose major concern is the proper distribution of certificates across many sites.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    A PKI is a structure that provides all the necessary components to enable different users and entities to communicate in a secure and a predictable manner.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Good Essays

    PKI Paper

    • 801 Words
    • 3 Pages

    In a single service package, a commercial PKI provides reliability, support, and indemnification over in-house PKI solution. Commercial PKI offerings are relatively well-tested…

    • 801 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Satisfactory Essays

    Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Information Security has come to play an extremely vital role in today’s fast moving but invariably technically fragile business environment. Consequently, secured communications and business are needed in order for both Cooney Hardware Ltd. and our customers to benefit from the advancements the internet has given us. The importance of this fact needs to be clearly highlighted, not only to enhance the company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security.…

    • 676 Words
    • 2 Pages
    Good Essays