PKI (Public Key Infrastructure)

Radia Perlman, Sun Microsystems Laboratories

Introduction

Authentication

Authorization

Security without Public Key Cryptography

Functional Comparison between Public Key– and Secret Key–Based Systems

Issues with Public Key Infrastructure

PKI Models

Monopoly

Oligarchy

Anarchy

Name-Based Trust

Top-Down, Name-Based

Bottom-Up, Name-Based

Bridge Model

Using PKI

Certificate Revocation

Conclusion

Glossary

Cross References

Further Reading

INTRODUCTION

PKI is an acronym for “public key infrastructure.” This chapter discusses what that means and the challenges associated with providing this functionality.

If Bob believes Alice's public key is pubA, and Alice knows the private key associated with pubA, then Bob can use pubA to encrypt a message for Alice, or Alice can use the associated private key to prove to Bob that she is Alice (i.e., she can authenticate to Bob). The purpose of a PKI is to provide a convenient and secure method for obtaining the public key associated with some principal.

The basic idea is to have a trusted authority known as a CA (certification authority) digitally sign a message known as a certificate, thereby vouching that a particular key goes with a particular name. If Alice has been certified by the CA, Bob knows the CA's public key, Bob trusts that CA, and Bob receives Alice's certificate, then he can validate the CA's signature on that certificate and know Alice's public key. In the chapter about digital certificates in this volume, ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.