From the course: Learning Cryptography and Network Security
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Managing keys using PKI
From the course: Learning Cryptography and Network Security
Managing keys using PKI
Public key infrastructure provides a way to manage and securely distribute keys. In this segment, we'll describe the framework and outline how it is used to assure trust during a data transaction. Before beginning a transaction on the Internet, we need to use someone's public key for a secure key exchange. Ensuring the key that was sent belongs to the appropriate entity is fundamental for establishing trust in a transaction and is the primary role of the public key infrastructure. The public key infrastructure is used to generate, manage, distribute, and revoke digital certificates that enable secure communication over an insecure network. PKI is not a single protocol, but a framework comprised of several different components. That includes the algorithms, keys, and certificate authorities. Next, to fully understand how PKI assures trust, it's helpful to understand a few key concepts. A certificate is a set of descriptive data that provides proof of identity and is a way to ensure…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.