Which of the following encryption concepts is pki based on?

What is PKI and What is it used for?

The Public key infrastructure (PKI) is the set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and public-keys. PKIs are the foundation that enables the use of technologies, such as digital signatures and encryption, across large user populations. PKIs deliver the elements essential for a secure and trusted business environment for e-commerce and the growing Internet of Things (IoT).

PKIs help establish the identity of people, devices, and services – enabling controlled access to systems and resources, protection of data, and accountability in transactions. Next generation business applications are becoming more reliant on PKI technology to guarantee high assurance, because evolving business models are becoming more dependent on electronic interaction requiring online authentication and compliance with stricter data security regulations.

The Role of Certificate Authorities (CAs)

In order to bind public keys with their associated user (owner of the private key), PKIs use digital certificates. Digital certificates are the credentials that facilitate the verification of identities between users in a transaction. Much as a passport certifies one’s identity as a citizen of a country, the digital certificate establishes the identity of users within the ecosystem. Because digital certificates are used to identify the users to whom encrypted data is sent, or to verify the identity of the signer of information, protecting the authenticity and integrity of the certificate is imperative to maintain the trustworthiness of the system.

Certificate authorities (CAs) issue the digital credentials used to certify the identity of users. CAs underpin the security of a PKI and the services they support, and therefore can be the focus of sophisticated targeted attacks. In order to mitigate the risk of attacks against CAs, physical and logical controls as well as hardening mechanisms, such as hardware security modules (HSMs) have become necessary to ensure the integrity of a PKI.

Contact a specialist about Public Key Infrastructure (PKI)

PKI Deployment

PKIs provide a framework that enables cryptographic data security technologies such as digital certificates and signatures to be effectively deployed on a mass scale. PKIs support identity management services within and across networks and underpin online authentication inherent in secure socket layer (SSL) and transport layer security (TLS) for protecting internet traffic, as well as document and transaction signing, application code signing, and time-stamping. PKIs support solutions for desktop login, citizen identification, mass transit, mobile banking, and are critically important for device credentialing in the IoT. Device credentialing is becoming increasingly important to impart identities to growing numbers of cloud-based and internet-connected devices that run the gamut from smart phones to medical equipment.

Cryptographic Security

Using the principles of asymmetric and symmetric cryptography, PKIs facilitate the establishment of a secure exchange of data between users and devices – ensuring authenticity, confidentiality, and integrity of transactions. Users (also known as “Subscribers” in PKI parlance) can be individual end users, web servers, embedded systems, connected devices, or programs/applications that are executing business processes. Asymmetric cryptography provides the users, devices or services within an ecosystem with a key pair composed of a public and a private key component. A public key is available to anyone in the group for encryption or for verification of a digital signature. The private key on the other hand, must be kept secret and is only used by the entity to which it belongs, typically for tasks such as decryption or for the creation of digital signatures.

The Increasing Importance of PKIs

With evolving business models becoming more dependent on electronic transactions and digital documents, and with more Internet-aware devices connected to corporate networks, the role of a PKI is no longer limited to isolated systems such as secure email, smart cards for physical access or encrypted web traffic. PKIs today are expected to support larger numbers of applications, users and devices across complex ecosystems. And with stricter government and industry data security regulations, mainstream operating systems and business applications are becoming more reliant than ever on an organizational PKI to guarantee trust.

Learn more how PKIs secure digital applications and validate everything from transactions and identities to supply chains. 

Public Key Infrastructure (PKI) is a technology for authenticating users and devices in the digital world. The basic idea is to have one or more trusted parties digitally sign documents certifying that a particular cryptographic key belongs to a particular user or device. The key can then be used as an identity for the user in digital networks.

The users and devices that have keys are often just called entities. In general, anything can be associated with a key that it can use as its identity. Besides a user or device, it could be a program, process, manufacturer, component, or something else. The purpose of a PKI is to securely associate a key with an entity.

The trusted party signing the document associating the key with the device is called a certificate authority (CA). The certificate authority also has a cryptographic key that it uses for signing these documents. These documents are called certificates.

In the real world, there are many certificate authorities, and most computers and web browsers trust a hundred or so certificate authorities by default.

A public key infrastructure relies on digital signature technology, which uses public key cryptography. The basic idea is that the secret key of each entity is only known by that entity and is used for signing. This key is called the private key. There is another key derived from it, called the public key, which is used for verifying signatures but cannot be used to sign. This public key is made available to anyone, and is typically included in the certificate document.

X.509 Standard

Most public key infrastructures use a standardized machine-readable certificate format for the certificate documents. The standard is called X.509v3. Originally, it was an ISO standard, but these days it is maintained by the Internet Engineering Task Force as RFC 3280.

Common Uses of Certificates

Secure Web Sites - HTTPS

The most familiar use of PKI is in SSL certificates. SSL (Secure Sockets Layer) is the security protocol used on the web when you fetch a page whose address begins with https:. TLS (Transport Layer Security) is a newer version of the protocol. In practice, most websites now use the new version.

With HTTPS, certificates serve to identify the web site you are connecting to, to ensure that no-one can eavesdrop on your connection or, for example, inject fraudulent wire transfers or steal credit card numbers.

Certificates and cryptographic authentication of the server prevent man-in-the-middle attacks. For secure communications, it is necessary to authenticate the communicating parties and encrypt the communications to protect passwords and data from malicious devices and hackers in the network.

Authenticating Users and Computers - SSH

The Secure Shell protocol supports certificates for authenticating hosts and users. Tectia SSH uses standards-based X.509 certificates, whereas OpenSSH uses its own proprietary certificate formats.

Email Signing and Encryption

Certificates are also used for secure email in corporations. The S/MIME standard specifies a message format for signed and encrypted messaging, using the X.509 certificate formats.

PGP (Pretty Good Privacy) and its free version, Gnu Privacy Guard (GPG), use their own certificate format and a somewhat different trust model. However, they still offer email encryption and are quite popular.

Security Limitations of Public Key Infrastructure

The main weakness of public PKI is that any certificate authority can sign a certificate for any person or computer. Certificate authorities exist in many countries, some of which have rather authoritarian or even potentially hostile governments. Sometimes certificate authorities create or are coerced to create certificates for parties they have no business vouching for.

Among other things, intelligence agencies can use fraudulent certificates for espionage, malware injection, and forging messages or evidency to disrupt or discredit adversaries. For this reason, only limited trust should be placed on certificates from public certificate authorities.

Some organizations run their own private public key infrastructures. This means they run their own internal certificate authority. When the organization only trusts the internal CA for a certain purpose, there is a fair certainty that no-one else can issue certificates on their behalf. When they also trust public PKIs for the same entities, there is no added security, but they may save cost.

SSH's Role in the Development of Public Key Infrastructure

SSH Communications Security was one of the early pioneers in PKI. We participated in the standardization work for X.509v3 and proposed an alternative approach called Simple Public Key Infrastructure (SPKI) to address some of the trust issues with the X.509 standard. We wrote some of the standards documents on certificate enrollment protocols. We were also selling an advanced certificate authority product called SSH Certifier from 2001 onwards. Among other things, it pioneered support for multiple certificate authorities and multiple registration authorities in the same system and using customizable policy rules for choosing the certificate authority to obtain a certificate from. For more information, see SSH's contributions to PKI and Certificate management.

What is PKI encryption?

PKI (or Public Key Infrastructure) is the framework of encryption and cybersecurity that protects communications between the server (your website) and the client (the users). Think about all the information, people, and services that your team communicates and works with.

What is PKI based authentication?

PKI authentication uses a certificate to validate data being sent from one point to another. Each individual has a public key and a private key. Under PKI certificate-based authentication, this public key is shared and used to validate the identity of the person transmitting the data and to decrypt the data itself.

Which one of the following PKI is based on certificate authorities?

509 certificates. This is because they are based on the ITU standard X. 509. The Certification Authority (CA) stores the public key of a user along with other information about the client in the digital certificate.

Does a PKI use symmetric or asymmetric encryption explain your answer?

PKI makes use of both symmetric and asymmetric encryption to keep all its assets secure. Asymmetric encryption or Public Key Cryptography uses two separate keys for encryption and decryption. One of them is known as a public key, and the other is a private key.