[WEBINAR] Better to Ask Permission? Best Practices for Privacy and Security

Public Key Infrastructure (PKI)

Definition - What does Public Key Infrastructure (PKI) mean?

A public key infrastructure (PKI) allows users of the Internet and other public networks to engage in secure communication, data exchange and money exchange. This is done through public and private cryptographic key pairs provided by a certificate authority.

Techopedia explains Public Key Infrastructure (PKI)

There are different types of systems in a PKI:

  1. Private and Public Key Systems: Private systems are symmetric cryptography and a public systems are asymmetric cryptography. Currently, public key systems are the most common.
  2. Symmetric Encryption Systems: The same key is used for both the processes of encryption and decryption.
  3. Asymmetric Encryption Systems: A different key is used for each process. One key is the public key and the other key is the private key. If something is encrypted with the public key, then decryption can only be done with the private key. Alternatively, if something is encrypted with the private key, then decryption must be done only with the public key.

A certificate authority (CA) is the entity providing the keys. The private key will be given to the person requesting the key. The public key is made public in a directory for users. No one can ever find out what someone’s private key is, never being available on the Internet. The private key is used for proving user identity and encrypting the digital certificate. The digital certificate will be decrypted by the public key, which is used by the message receiver.

There are several companies enabling a PKI. The registration process for a digital certificate begins with a registration authority (RA). This refistration must take place before the CA knows whether or not the user will be issued a certificate.

There are many pieces involved in PKI. Properly enabled, these provide smooth, transparent and secure communications.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.