What is PKI | Public Key Infrastructure (2024)

What is PKI?

Public Key Infrastructure (PKI) is a system of processes, technologies, and policies that allows you to encrypt and sign data. You can issue digital certificates that authenticate the identity of users, devices, or services. These certificates create a secure connection for both public web pages and private systems—such as your virtual private network (VPN), internal Wi-Fi, wiki pages, and other services that support MFA. Have questions?

VISIT PKI FAQS

Common PKI Use Cases

What is PKI | Public Key Infrastructure (2)

Encrypting files

What is PKI | Public Key Infrastructure (3)

Authenticating and encrypting email

What is PKI | Public Key Infrastructure (4)

Authenticating nodes to wireless

What is PKI | Public Key Infrastructure (5)

Authenticating VPN connections

TALK TO AN EXPERT TO LEARN HOW DIGICERT SOLUTIONS
CAN HELP YOU DELIVER DIGITAL TRUST

FAQS

What is PKI?

Public Key Infrastructure (PKI) is a system of processes, technologies, and policies that allows you to encrypt and/or sign data. With PKI, you can issue digital certificates that authenticate the identity of users, devices, or services. These certificates work for both public web pages and private internal services (e.g., to authenticate devices connecting with your VPN, Wiki, Wi-Fi, etc.)

Why should my organization use PKI?

With Public Key Infrastructure (PKI), you can significantly increase the security level of your network. Three key benefits make this possible:

  • Authentication: Validate identities to ensure only authorized users and devices have access to a server.
  • Encryption: Use a certificate to create an encrypted session, so information can be transmitted privately.
  • Data Integrity: Ensure any messages or data transferred to and from devices and servers are not altered.

How is PKI used?

Common use cases for PKI include, but are not limited to:

  • Securing web pages
  • Encrypting files
  • Authenticating and encrypting email messages using S/MIME
  • Authenticating nodes connecting to a wireless network
  • Authenticating connections to your VPN
  • Authenticating connections to sites and services containing corporate data using TLS mutual authentication

What’s end-to-end encryption?

End-to-end encryption is when a message is encrypted at your device, and the decryption is done at the recipient’s device. This means that no third party can intercept your sensitive data.

What is a CA?

A Certificate Authority (CA) is a trusted third party that verifies the identity of an organization applying for a digital certificate. After verifying the organization’s identity, the CA issues a certificate and binds the organization’s identity to a public key. A digital certificate can be trusted because it is chained to the CAs root certificate.

What is a digital certificate?

A digital certificate vouches for the holder’s identity. Like a driver’s license, the certificate has been issued by a trusted third party, cannot be forged, and contains identifying information.

What are public and private keys, and how are they related?

Public and private keys are used to encrypt and decrypt information. Only the private key can decrypt information encrypted by the public key. This key pair is known as asymmetric cryptography (because the encryption is done using non-identical keys). The two keys are mathematically related, but it’s impossible to determine one key using the other.

What are public and private roots?

A root certificate provides the signature when binding an identity to the public key. This is how you identify whether a certificate is valid, and whether you should trust it.

Does DigiCert offer solutions for both public and private PKI?

The short answer is, yes. DigiCert offers solutions for both public and private PKI, along with a platform and RESTful API, which allow you to automate certificate management and customize PKI workflows. You may have only worked with a commercial CA to purchase public SSL certificates. With this as your only reference point, you might assume private certificates have similar costs as public certificates—this isn’t the case. Issuing a private digital certificate with DigiCert is a fraction of the cost of a public certificate.

Security engineers and administrators sometimes mistakenly think a hosted private PKI will limit them to certain certificate profiles. They think they’ll only have access to certificate profiles that are approved by the CA/Browser Forum. However, DigiCert can provide you with any certificate profile you need. These certificate profiles don’t have to be SSL/TLS certificate profiles—they don’t even have to be X.509.

What’s MPKI?

Managed PKI (MPKI) is a solution provided by a CA that allows you to begin automating certificate processes and customizing PKI workflows. Once your organization gets to the point that it requires a high volume of certificates, you’ll benefit from an MPKI solution that simplifies certificate management.

Should we set up an internal CA (build) or use a hosted CA (buy)?

You can secure your internal services (e.g., VPN, WiFi, Wiki, etc.) using an internal CA. Organizations commonly do this using Microsoft CA. However, building and maintaining an internal CA can be expensive and time-consuming. You’ll want to carefully consider the costs of each before deciding. Many CAs provide hosted solutions that can save you from some of the hardware, software, and personnel costs involved in building an internal PKI.

What is a Certificate Policy?

A Certificate Policy (CP) is a document created to identify the different actors of a PKI and their roles and duties. The CP specifies practices like how certificates can be used, how certificate names are to be chosen, how keys are to be generated, and much more. The associated CP is typically specified in a field of the X.509 certificate. For in-depth information on CP, see the most up-to-date reference document (RFC 3647): https://tools.ietf.org/html/rfc3647

What is key storage and how should we handle it?

Key storage, often referred to as key archival, is securely storing the private key in case it’s lost. To meet FIPS compliance, and ensure the highest level of security, we suggest storing your keys using a Hardware Security Module (HSM).

What is an HSM?

An HSM is a cryptographic hardware-based option for secure key storage. Typically, HSMs are physically located on-premises, and require internal resources to maintain. This can be cost intensive, but less expensive options do exist. For example, the Microsoft Azure Key Vault provides secure storage of keys in Microsoft’s cloud HSM. If you’re a smaller organization, or don’t have the resources to purchase and maintain your own HSM, Microsoft Azure Key Vault is a viable solution. Some public CAs, including DigiCert, offer integrations with Microsoft Azure.

How do I get started with building a PKI?

To get started, you’ll need to evaluate your environment by considering your needs and the technology you’re working with. We suggest these five steps to get started:

  • Identify your non-negotiable network security risks
  • Pinpoint the network security risks PKI can mitigate
  • Develop the right mix of public and private PKI
  • Decide whether to build (internal CA) or buy (hosted CA)
  • Determine how to automate delivery of certificates to devices

If you need help, contact one of our PKI architects by sending an email to enterprise@digicert.com.

What is PKI | Public Key Infrastructure (2024)

FAQs

What is PKI | Public Key Infrastructure? ›

Public key infrastructure (PKI) refers to tools used to create and manage public keys for encryption, which is a common method of securing data transfers on the internet.

What is public key infrastructure PKI quizlet? ›

PKI. Public Key Infrastructure - an arrangement that binds public keys with respective identities of entities.

What does PKI mean in it? ›

The Public key infrastructure (PKI) is the set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and public-keys.

What are the four responsibilities of a PKI public key infrastructure )? ›

A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.

What are four key components of the public key infrastructure PKI framework? ›

Elements for making a PKI
  • Private and Public Keys. PKI uses these asymmetric keys to establish and secure an encrypted connection over the network using asymmetric encryption.
  • Public Key Certificates. ...
  • Certificate Authority. ...
  • Registration Authority (RA) ...
  • Secure storage. ...
  • Certificate Repository. ...
  • Automating PKI Operations.

What is the infrastructure of PKI? ›

Public key infrastructure (PKI) refers to tools used to create and manage public keys for encryption, which is a common method of securing data transfers on the internet. PKI is built into all web browsers used today, and it helps secure public internet traffic.

How many keys are in PKI? ›

The need for two key pairs

To meet these requirements, a PKI must support two key pairs for each user. At any point in time, a user must have one current key pair for encryption and decryption, and a second key pair for digital signature and signature verification.

What does the PKI do? ›

A Public Key Infrastructure Definitive Guide. Public key infrastructure (PKI) governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications.

How does PKI work for dummies? ›

PKI enables strong authentication by using digital certificates and key pairs. This ensures that only authorised entities can access sensitive systems and data. When, for example, a user tries to authenticate their identity to a server, the server generates random data and sends it to the user.

What is Microsoft PKI infrastructure? ›

A public key infrastructure (PKI) creates, manages, distributes, stores, and revokes digital certificates.

Why do I need PKI? ›

Public Key Infrastructure (PKI) is important because it significantly increases the security of a network and provides the foundation for securing all internet-connected things. PKI is a core component of data confidentiality, information integrity, authentication, and data access control.

What are the two important components of a PKI? ›

Components of a PKI
  • Certificate authority (CA) - Issues an entity's certificate and acts as a trusted component within a private PKI. ...
  • Certificate - A digital document, signed by a CA, and used to prove the owner of a public key, within a PKI.

What are the disadvantages of PKI? ›

Disadvantages of PKI
  • Complexity. Deployment and maintenance of an on-site PKI system can be complex and costly regarding resources. ...
  • Cost. Implementing and managing a PKI technology can be costly. ...
  • Certificate revocation. Every digital certificate has an expiration date. ...
  • Dependency on CAs.
May 17, 2023

What is an example of a PKI? ›

A prime example of PKI in communication is secure email. S/MIME (Secure/Multipurpose Internet Mail Extensions) uses digital certificates to encrypt emails. Both sender and recipient need a trusted CA-signed certificate.

What is the primary goal of PKI? ›

Public key infrastructure has a long history of securing and authenticating digital communications with two main goals: to ensure the privacy of the message being sent and to verify that the sender is who they claim to be.

How are PKI keys generated? ›

In a PKI system, the client generates a public-private key pair. The public key and information to be imprinted on the certificate are sent to the CA. The CA then creates a digital certificate consisting of the user's public key and certificate attributes. The certificate is signed by the CA with its private key.

What is the public and private key in PKI? ›

Today, organizations rely on PKI to manage security through encryption. Specifically, the most common form of encryption used today involves a public key, which anyone can use to encrypt a message, and a private key (also known as a secret key), which only one person should be able to use to decrypt those messages.

What are two components of a PKI? ›

Components of a PKI
  • Certificate authority (CA) - Issues an entity's certificate and acts as a trusted component within a private PKI. ...
  • Certificate - A digital document, signed by a CA, and used to prove the owner of a public key, within a PKI.

Is PKI also known as public key encryption True False? ›

The network also has a public key and a private key. The sender uses a public key to encrypt the message. The recipient uses its private key to decrypt the message. Public key infrastructure (PKI) is a set of hardware, software, organizations, and policies to public key encryption work on the Internet.

Top Articles
Latest Posts
Article information

Author: Kareem Mueller DO

Last Updated:

Views: 5646

Rating: 4.6 / 5 (46 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Kareem Mueller DO

Birthday: 1997-01-04

Address: Apt. 156 12935 Runolfsdottir Mission, Greenfort, MN 74384-6749

Phone: +16704982844747

Job: Corporate Administration Planner

Hobby: Mountain biking, Jewelry making, Stone skipping, Lacemaking, Knife making, Scrapbooking, Letterboxing

Introduction: My name is Kareem Mueller DO, I am a vivacious, super, thoughtful, excited, handsome, beautiful, combative person who loves writing and wants to share my knowledge and understanding with you.