110 likes | 225 Vues
This project report provides an in-depth exploration of Public Key Infrastructure (PKI) and its associated PKIX standards. It covers the essential functionalities of PKI, including key pair creation, certification processes, and public key cryptography applications. The document discusses the roles of Certification Authorities and different types of certificate management systems, emphasizing their importance in a secure digital environment. It aims to promote the development of open-source PKI solutions, addressing crucial concepts such as certificate revocation, policies, and management protocols.
E N D
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam
Introduction • PKI’s? • Functionality of a Public Key Infrastructure • Creation of the key–pair and the certificate request • Signing of the certificate request by the Certification Authority • Certification Authority chains • Typical uses of public key cryptography
PKIX • Important concepts with regard to the PKIX standards • Certificate–using Systems and PKIs • Certificate–using Systems and PMIs
PKIX (cntd …) • PKIX standardization areas. • Public–key infrastructure functionality • Public–Key Infrastructure (PKI) • Privilege Management Infrastructure (PMI)
PKIX standardization areas • PKIX standardization areas • Profiles of X.509 v3 Public Key Certificates and X.509 v2 Certificate Revocation Lists (CRLs). • Management protocols • Operational protocols. • Certificate policies and Certificate Practice Statements. • Time–stamping and data–certification/validation services
Public–key infrastructure functionality • Registration • Initialisation • Certification • Key–pair recovery • Key generation • Key update • Key expiry • Key compromise • Cross certification • Revocation • Certificate and Revocation Notice Distribution and Publication
Conclusion • This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality. Its aim is foster the creation of viable open–source PKI implementations.