Public Key Infrastructure

Submitted by: Submitted by

Views: 10

Words: 1710

Pages: 7

Category: Science and Technology

Date Submitted: 10/05/2015 12:02 PM

Report This Essay

PKI(Public-keyinfrastructure):

Sending sensitive data over any web or network could be one of the toughest things to guarantee, especially when sending sensitive data over to a specific person on the other end of the string because there are so many interferences or obstacles that could incur to interfere with the information or messages a person is trying to send whether it’s tweaking the information, deleting it, chopping sections of it or basically just copying it and keeping it using it when sensitive information could really hurt the participants if the data and information gets leaked or gets into the hands of people that aren’t supposed to have that information.

PKI, Public Key Infrastructure helps ensure that the data or information that is being sent over the Internet is being sent between the expected participants and no one else, it also helps keeping the data safe and secure incase it gets leaked throughout the communication line, the information will not be in plain text therefore they will not be able to know what’s contained in the message. To do so, PKI uses public key and private keys to encrypt and decrypt information. The public key is used to send give to the sender so they use it while encoding the message. The sender uses the receivers public key with the message they’re trying to send to encode the message according to the public key, which is linked to the receivers private key as well. The receiver then uses the encoded message and they’re private key and a passcode if applicable to decrypt the message. The private key is only for you; you only use your private key to decrypt a message and you don’t have to share it with the sender, only the public key is sent to the sender.

RFC 2822 (Internet Security Glossary) defines public-key infrastructure (PKI) as the set of hardware, software, people, policies, and procedures needed to create ,manage, store, distribute, and revoke digital certificates based on asymmetric cryptography. The...