Public Key Infrastructure
Applications

Public Key Infrastructure

Public Key Infrastructure. Build a trusted and secure business environment by authenticating users, networks, applications and devices.

A Public Key Infrastructure (PKI) is critical in establishing a trustworthy and secure business environment by being able to verify and exchange data between multiple entities which can be users, networks, applications or devices. The purpose of a PKI is to create a trusted environment for the connected entities. PKI works through the implementation of two technologies: digital certificates and cryptographic keys.

By using the private key of the CA of the PKI can issue, renew and revoke digital certificates to ensure the trusted authentication and management of all entities within the trusted environment. Those digital certificates are the base for secure connection and communication of the entities within the trusted environment.

By issuing a digital certificate, the PKI creates the link between the cryptographic key pair of the individual entity and the entity itself by cryptographically binding them. The most important task of the PKI is to create a chain of trust: in any connected environment every entity of the environment can implicitly trust each other by explicitly trusting the root CA of the PKI. This chain of trust enables secure connection, communication and data exchange within the trusted PKI environment.

A PKI is built around a set of components and procedures for managing public and private key pairs:

  • A Certificate Authority (CA) responsible for digital certificate issuance and revocation

  • A digital certificate that is signed by a CA that proves the owner of a public key within a PKI. Before the CA can issue a certificate, the RA must authorize the request

  • A registration authority (RA) who verifies the identity of an end entity. This is a key part of the process, and it includes a mechanism to enroll end entities into the PKI

  • A validation authority (VA) allows an entity to check that a certificate has not been revoked

  • A central directory for storing and indexing certificates

  • A certificate management system that manages items such as access to stored certificates or the issuance of certificates.

 

How a PKI works

How a PKI works

Public Key Infrastructure explained

Business Value

Business Value

Icon

Authentication

  • Public key infrastructure (PKI) provides the ability to authenticate machine and user identities through a Certification Authority who are responsible for issuing digital certificates and providing mechanisms for identifying the relevant entity holding those digital certificates.
Icon

Privacy

  • Digital certificates provide the mechanism to protect information. Messages can be encrypted to minimize the risk that they can be read in transit, or by anyone, other than the intended recipient.

  • PKI is used to increase the privacy of messages.

Icon

Integrity

  • When conducting business over the Internet, a company must have assurance that any transaction or information provided during the course of business will not be altered or tampered with during transmission.

  • Public key infrastructure (PKI) is a critical component for transaction security. PKI provides the recipient of a message with a mechanism to check if the message remains the same as it was when it was sent.

Icon

Non-repudiation

  • Public key infrastructure (PKI) provides a mechanism for signing electronic transactions in a similar way to signing a document.
  • A PKI provides for the creation of a unique signature. This coupled with appropriate policies and procedures creates an environment where the sender is unable to deny or repudiate a message sent in accordance with these procedures.
u.trust Identify

u.trust Identify

All-in-one solution to deploy and operate a Public Key Infrastructure (PKI)

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.