The main features of the public key infrastructure


  • M.O. Bodnia Харківський національний університет імені В.Н. Каразіна, Ukraine
  • M.V. Yesina Харківський національний університет імені В.Н. Каразіна, АТ «Інститут Інформаційних технологій», Ukraine
  • V.A. Ponomar Харківський національний університет імені В.Н. Каразіна, АТ “Інститут Інформаційних Технологій”, Ukraine



authentication, identification, chain of trust, public key infrastructure paradigm, smart cards, third party, digital certificates


Trust is the basis of any communication, whether it is built in the physical world or in the digital environment. Establishing trust in the physical world does not pose any particular challenges because communication subjects can identify each other through biometric features, identity card or other identification documents. In the digital environment, a number of difficulties arise for the identification and authentication procedure. The communicating parties do not meet face-to-face and can be at a significant distance from each other. As a result, they cannot identify uniquely and verify each other's identity using the identity verification methods used in the material world. To ensure the security of electronic communications, it is necessary for communication systems to be equipped with technical means of information protection and an additional mechanism that will contribute to the establishment of trust between the parties to the communication. The Public Key Infrastructure is used to solve problems related to trust, authentication, identity, and security on a network. A digital certificate is a fundamental element for establishing trust in the digital world. It plays a crucial role in ensuring security and identification on the Internet and when working with electronic resources. The Public Key Infrastructure is a trusted system used to ensure the security and privacy of information across networks and platforms. This system is based on public key cryptography. It implements the management of public keys and digital certificates of various entities, such as companies, corporations, organizations, individuals, websites, servers, etc. The Public Key Infrastructure is widely deployed in government portals and systems. It is used in the electronic government system to guarantee the transparency of the provision of electronic services and to ensure the security of communication links between authorities and society. The Public Key Infrastructure represents a multifaceted structure that includes a set of standards, technologies, and procedures for managing, storing, and distributing keys and digital certificates. A certificate authority is a key component of a public key infrastructure and is an independent third party that manages digital certificates. Various technical and cryptographic means of information security are used in the Public Key Infrastructure, such as digital signatures, encryption, hash functions, hardware security modules, key management software, etc. The main purpose of this article is to analyze the main features and aspects of public key infrastructure.


Інфраструктура управління відкритими ключами PKI. [Електронний ресурс]. Режим доступу:

CCNA Cyber Ops (Version 1.1). Chapter 9: Cryptography and the Public Key Infrastructure. [Електронний ресурс]. Режим доступу:

PKI for EMV cards compliant to PCI DSS. [Електронний ресурс]. Режим доступу:

Certificate authority (CA). [Електронний ресурс]. Режим доступу:

PKI Fundamentals. [Електронний ресурс]. Режим доступу:

What is a Registration Authority? [Електронний ресурс]. Режим доступу:

Інфраструктура відкритих ключів. [Електронний ресурс]. Режим доступу:Інфраструктура_відкритих_ключів.

Certificate Revocation List (CRL). [Електронний ресурс]. Режим доступу:

Online Certificate Status Protocol. [Електронний ресурс]. Режим доступу:

Cryptography and Public Key Infrastructure. Режим доступу:

Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier. Introduction to Public Key Infrastructures. 2013. Р. 68–70.



How to Cite

Bodnia, M., Yesina, M., & Ponomar, V. (2023). The main features of the public key infrastructure. Radiotekhnika, 3(214), 17–25.