前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >CISSP考试指南笔记:3.18 公钥基础设施

CISSP考试指南笔记:3.18 公钥基础设施

作者头像
血狼debugeeker
发布2021-01-29 10:39:17
3870
发布2021-01-29 10:39:17
举报
文章被收录于专栏:debugeeker的专栏

Public key infrastructure (PKI) consists of programs, data formats, procedures, communication protocols, security policies, and public key cryptographic mechanisms working in a comprehensive manner to enable a wide range of dispersed people to communicate in a secure and predictable fashion.

PKI is an ISO authentication framework that uses public key cryptography and the X.509 standard. The framework was set up to enable authentication to happen across different networks and the Internet.

PKI provides authentication, confidentiality, nonrepudiation, and integrity of the messages exchanged.

PKI is made up of many different parts: certificate authorities, registration authorities, certificates, keys, and users.

Certificate Authorities


The certificate is created and signed (digital signature) by a trusted third party, which is a **certificate authority (CA).**When the CA signs the certificate, it binds the individual’s identity to the public key, and the CA takes liability for the authenticity of that individual.

A CA is a trusted organization (or server) that maintains and issues digital certificates. When a person requests a certificate, the registration authority (RA) verifies that individual’s identity and passes the certificate request off to the CA. The CA constructs the certificate, signs it, sends it to the requester, and maintains the certificate over its lifetime.

Cross certification is the process undertaken by CAs to establish a trust relationship in which they rely upon each other’s digital certificates and public keys as if they had issued them themselves.

The CA is responsible for creating and handing out certificates, maintaining them, and revoking them if necessary. Revocation is handled by the CA, and the revoked certificate information is stored on a certificate revocation list (CRL).

Online Certificate Status Protocol (OCSP) is being used more and more rather than the cumbersome CRL approach.OCSP checks the CRL that is maintained by the CA.

剩余内容请看本人公众号debugeeker, 链接为CISSP考试指南笔记:3.18 公钥基础设施

本文参与 腾讯云自媒体同步曝光计划,分享自作者个人站点/博客。
原始发表:2021/01/23 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • Certificate Authorities
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档