From the course: Learning Cryptography and Network Security

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Managing keys using PKI

Managing keys using PKI

Public key infrastructure provides a way to manage and securely distribute keys. In this segment, we'll describe the framework and outline how it is used to assure trust during a data transaction. Before beginning a transaction on the Internet, we need to use someone's public key for a secure key exchange. Ensuring the key that was sent belongs to the appropriate entity is fundamental for establishing trust in a transaction and is the primary role of the public key infrastructure. The public key infrastructure is used to generate, manage, distribute, and revoke digital certificates that enable secure communication over an insecure network. PKI is not a single protocol, but a framework comprised of several different components. That includes the algorithms, keys, and certificate authorities. Next, to fully understand how PKI assures trust, it's helpful to understand a few key concepts. A certificate is a set of descriptive data that provides proof of identity and is a way to ensure…

Contents