What is PKI (Public Key Infrastructure)? (2024)

Public Key Infrastructure (PKI) is a technology for authenticating users and devices in the digital world. The basic idea is to have one or more trusted parties digitally sign documents certifying that a particular cryptographic key belongs to a particular user or device. The key can then be used as an identity for the user in digital networks.

The users and devices that have keys are often just called entities. In general, anything can be associated with a key that it can use as its identity. Besides a user or device, it could be a program, process, manufacturer, component, or something else. The purpose of a PKI is to securely associate a key with an entity.

The trusted party signing the document associating the key with the device is called a certificate authority (CA). The certificate authority also has a cryptographic key that it uses for signing these documents. These documents are called certificates.

In the real world, there are many certificate authorities, and most computers and web browsers trust a hundred or so certificate authorities by default.

A public key infrastructure relies on digital signature technology, which uses public key cryptography. The basic idea is that the secret key of each entity is only known by that entity and is used for signing. This key is called the private key. There is another key derived from it, called the public key, which is used for verifying signatures but cannot be used to sign. This public key is made available to anyone, and is typically included in the certificate document.

Contents

X.509 Standard Common Uses of Certificates Secure Web Sites - HTTPS Authenticating Users and Computers - SSH Email Signing and Encryption Security Limitations of Public Key Infrastructure SSH's Role in the Development of Public Key Infrastructure

X.509 Standard

Most public key infrastructures use a standardized machine-readable certificate format for the certificate documents. The standard is called X.509v3. Originally, it was an ISO standard, but these days it is maintained by the Internet Engineering Task Force as RFC 3280.

Common Uses of Certificates

Secure Web Sites - HTTPS

The most familiar use of PKI is in SSL certificates. SSL (Secure Sockets Layer) is the security protocol used on the web when you fetch a page whose address begins with https:. TLS (Transport Layer Security) is a newer version of the protocol. In practice, most websites now use the new version.

With HTTPS, certificates serve to identify the web site you are connecting to, to ensure that no-one can eavesdrop on your connection or, for example, inject fraudulent wire transfers or steal credit card numbers.

Certificates and cryptographic authentication of the server prevent man-in-the-middle attacks. For secure communications, it is necessary to authenticate the communicating parties and encrypt the communications to protect passwords and data from malicious devices and hackers in the network.

Authenticating Users and Computers - SSH

The Secure Shell protocol supports certificates for authenticating hosts and users. Tectia SSH uses standards-based X.509 certificates, whereas OpenSSH uses its own proprietary certificate formats.

Email Signing and Encryption

Certificates are also used for secure email in corporations. The S/MIME standard specifies a message format for signed and encrypted messaging, using the X.509 certificate formats.

PGP (Pretty Good Privacy) and its free version, Gnu Privacy Guard (GPG), use their own certificate format and a somewhat different trust model. However, they still offer email encryption and are quite popular.

What is PKI (Public Key Infrastructure)? (1)

Security Limitations of Public Key Infrastructure

The main weakness of public PKI is that any certificate authority can sign a certificate for any person or computer. Certificate authorities exist in many countries, some of which have rather authoritarian or even potentially hostile governments. Sometimes certificate authorities create or are coerced to create certificates for parties they have no business vouching for.

Among other things, intelligence agencies can use fraudulent certificates for espionage, malware injection, and forging messages or evidency to disrupt or discredit adversaries. For this reason, only limited trust should be placed on certificates from public certificate authorities.

Some organizations run their own private public key infrastructures. This means they run their own internal certificate authority. When the organization only trusts the internal CA for a certain purpose, there is a fair certainty that no-one else can issue certificates on their behalf. When they also trust public PKIs for the same entities, there is no added security, but they may save cost.

SSH's Role in the Development of Public Key Infrastructure

SSH Communications Security was one of the early pioneers in PKI. We participated in the standardization work for X.509v3 and proposed an alternative approach called Simple Public Key Infrastructure (SPKI) to address some of the trust issues with the X.509 standard. We wrote some of the standards documents on certificate enrollment protocols. We were also selling an advanced certificate authority product called SSH Certifier from 2001 onwards. Among other things, it pioneered support for multiple certificate authorities and multiple registration authorities in the same system and using customizable policy rules for choosing the certificate authority to obtain a certificate from. For more information, see SSH's contributions to PKI and Certificate management.

What is PKI (Public Key Infrastructure)? (2024)

FAQs

What is public key infrastructure PKI technology? ›

Public key infrastructure (PKI) refers to tools used to create and manage public keys for encryption, which is a common method of securing data transfers on the internet. PKI is built into all web browsers used today, and it helps secure public internet traffic.

What is PKI and why is it important? ›

Public Key Infrastructure (PKI) is important because it significantly increases the security of a network and provides the foundation for securing all internet-connected things. PKI is a core component of data confidentiality, information integrity, authentication, and data access control.

What does the PKI do? ›

A Public Key Infrastructure Definitive Guide. Public key infrastructure (PKI) governs the issuance of digital certificates to protect sensitive data, provide unique digital identities for users, devices and applications and secure end-to-end communications.

What are 4 key components of the public key infrastructure PKI framework? ›

Elements for making a PKI
  • Private and Public Keys. PKI uses these asymmetric keys to establish and secure an encrypted connection over the network using asymmetric encryption.
  • Public Key Certificates. ...
  • Certificate Authority. ...
  • Registration Authority (RA) ...
  • Secure storage. ...
  • Certificate Repository. ...
  • Automating PKI Operations.

What is an example of a PKI? ›

A prime example of PKI in communication is secure email. S/MIME (Secure/Multipurpose Internet Mail Extensions) uses digital certificates to encrypt emails. Both sender and recipient need a trusted CA-signed certificate.

How does PKI work for dummies? ›

PKI enables strong authentication by using digital certificates and key pairs. This ensures that only authorised entities can access sensitive systems and data. When, for example, a user tries to authenticate their identity to a server, the server generates random data and sends it to the user.

What is the primary goal of PKI? ›

Public key infrastructure has a long history of securing and authenticating digital communications with two main goals: to ensure the privacy of the message being sent and to verify that the sender is who they claim to be.

What does PKI tell you? ›

PKI certificates

Digital certificates are used to verify digital identities. Digital certificates are also called PKI certificates or X. 509 certificates. A PKI certificate offers proof of identity to a requesting entity, which is verified by a third party and works like a digital passport or driver's license.

What is the goal of PKI? ›

Capabilities. PKI provides "trust services" - in plain terms trusting the actions or outputs of entities, be they people or computers. Trust service objectives respect one or more of the following capabilities: Confidentiality, Integrity and Authenticity (CIA).

What can PKI help with? ›

PKI security is used in many ways, but primarily it is used for:
  • Securing emails.
  • Securing web communications (such as retail transactions)
  • Digitally signing software.
  • Digitally signing applications.
  • Encrypting files.
  • Decrypting files.
  • Smart card authentication.

What are the two important components of a PKI? ›

Components of a PKI
  • Certificate authority (CA) - Issues an entity's certificate and acts as a trusted component within a private PKI. ...
  • Certificate - A digital document, signed by a CA, and used to prove the owner of a public key, within a PKI.

How do I use PKI for authentication? ›

To configure client PKI authentication
  1. Obtain a personal certificate for the client, and its private key, from a CA. ...
  2. Download the CA's certificate, which contains its public key and therefore can verify any personal certificate that the CA has signed. ...
  3. Install the personal certificate with its private key on the client.

What are the disadvantages of PKI? ›

Disadvantages of PKI
  • Complexity. Deployment and maintenance of an on-site PKI system can be complex and costly regarding resources. ...
  • Cost. Implementing and managing a PKI technology can be costly. ...
  • Certificate revocation. Every digital certificate has an expiration date. ...
  • Dependency on CAs.
May 17, 2023

What is the PKI concept? ›

public-key infrastructure (PKI)

A comprehensive system that enables the creation, issuance, management, distribution, use, storage, and revocation of digital certificates. A PKI consists of people, hardware, software, policies, documents, and procedures.

How many keys are in PKI? ›

The need for two key pairs

To meet these requirements, a PKI must support two key pairs for each user. At any point in time, a user must have one current key pair for encryption and decryption, and a second key pair for digital signature and signature verification.

What does a PKI engineer do? ›

PKI Professionals are responsible for supporting public key infrastructure systems, both internally and externally. They provide the senior engineering and design support required to build and maintain PKI systems, consulting on applications to prevent fraud and mitigate risk.

How do I get a PKI certificate? ›

How to get a PKI certificate
  1. Request the certificate online. The first step in getting a PKI certificate is typically to request one online. ...
  2. Install the PKI certificate. When you receive approval for a PKI certificate, the source usually sends it to you via email. ...
  3. Calibrate the security settings.
Feb 3, 2023

What are two components of a PKI? ›

Components of a PKI
  • Certificate authority (CA) - Issues an entity's certificate and acts as a trusted component within a private PKI. ...
  • Certificate - A digital document, signed by a CA, and used to prove the owner of a public key, within a PKI.

What is the difference between PKI and SSL? ›

1 PKI vs SSL certificates

SSL stands for secure sockets layer, which is a protocol that uses PKI to establish encrypted and authenticated connections between a client and a server. An SSL certificate is a type of digital certificate that verifies the identity and validity of a website or application.

Top Articles
Latest Posts
Article information

Author: Nathanial Hackett

Last Updated:

Views: 5699

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Nathanial Hackett

Birthday: 1997-10-09

Address: Apt. 935 264 Abshire Canyon, South Nerissachester, NM 01800

Phone: +9752624861224

Job: Forward Technology Assistant

Hobby: Listening to music, Shopping, Vacation, Baton twirling, Flower arranging, Blacksmithing, Do it yourself

Introduction: My name is Nathanial Hackett, I am a lovely, curious, smiling, lively, thoughtful, courageous, lively person who loves writing and wants to share my knowledge and understanding with you.