The main features of the public key infrastructure
Keywords:authentication, identification, chain of trust, public key infrastructure paradigm, smart cards, third party, digital certificates
Trust is the basis of any communication, whether it is built in the physical world or in the digital environment. Establishing trust in the physical world does not pose any particular challenges because communication subjects can identify each other through biometric features, identity card or other identification documents. In the digital environment, a number of difficulties arise for the identification and authentication procedure. The communicating parties do not meet face-to-face and can be at a significant distance from each other. As a result, they cannot identify uniquely and verify each other's identity using the identity verification methods used in the material world. To ensure the security of electronic communications, it is necessary for communication systems to be equipped with technical means of information protection and an additional mechanism that will contribute to the establishment of trust between the parties to the communication. The Public Key Infrastructure is used to solve problems related to trust, authentication, identity, and security on a network. A digital certificate is a fundamental element for establishing trust in the digital world. It plays a crucial role in ensuring security and identification on the Internet and when working with electronic resources. The Public Key Infrastructure is a trusted system used to ensure the security and privacy of information across networks and platforms. This system is based on public key cryptography. It implements the management of public keys and digital certificates of various entities, such as companies, corporations, organizations, individuals, websites, servers, etc. The Public Key Infrastructure is widely deployed in government portals and systems. It is used in the electronic government system to guarantee the transparency of the provision of electronic services and to ensure the security of communication links between authorities and society. The Public Key Infrastructure represents a multifaceted structure that includes a set of standards, technologies, and procedures for managing, storing, and distributing keys and digital certificates. A certificate authority is a key component of a public key infrastructure and is an independent third party that manages digital certificates. Various technical and cryptographic means of information security are used in the Public Key Infrastructure, such as digital signatures, encryption, hash functions, hardware security modules, key management software, etc. The main purpose of this article is to analyze the main features and aspects of public key infrastructure.
Інфраструктура управління відкритими ключами PKI. [Електронний ресурс]. Режим доступу: http://infoprotect.net/varia/infrastruktura-otkrytyh-klyuchey-pki.
CCNA Cyber Ops (Version 1.1). Chapter 9: Cryptography and the Public Key Infrastructure. [Електронний ресурс]. Режим доступу: https://itexamanswers.net/ccna-cyber-ops-version-1-1-chapter-9-cryptography-and-the-public-key-infrastructure.html.
PKI for EMV cards compliant to PCI DSS. [Електронний ресурс]. Режим доступу: https://www.cryptomathic.com/news-events/blog/pki-for-emv-cards-compliant-to-pci-dss.
Certificate authority (CA). [Електронний ресурс]. Режим доступу: https://www.techtarget.com/searchsecurity/definition/certificate-authority.
PKI Fundamentals. [Електронний ресурс]. Режим доступу: https://pki.treas.gov/pki_funds3.htm.
What is a Registration Authority? [Електронний ресурс]. Режим доступу: https://www.primekey.com/wiki/what-is-a-registration-authority/.
Інфраструктура відкритих ключів. [Електронний ресурс]. Режим доступу: https://ru.wikipedia.org/wiki/Інфраструктура_відкритих_ключів.
Certificate Revocation List (CRL). [Електронний ресурс]. Режим доступу: https://www.techtarget.com/searchsecurity/definition/Certificate-Revocation-List.
Online Certificate Status Protocol. [Електронний ресурс]. Режим доступу: https://uk.wikipedia.org/wiki/Online_Certificate_Status_Protocol
Cryptography and Public Key Infrastructure. Режим доступу: https://downloads.acs.com.hk/technology/494-09-pki-and-middleware.pdf.
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier. Introduction to Public Key Infrastructures. 2013. Р. 68–70.
How to Cite
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).