By Umair Ali
Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information. - architecture addresses confidentiality, integrity, non-repudiation and authorization of data. -Supports the distribution, management, expiration, rollover, backup, revoking of public and private keys
Dec 2004Version 1 The End-Entities (EE) – end user or an application. The Certificate Authority (CA) – third party assigns certificates The Certificate Repository (CR) - stores certificates that are issued and also revoked certificates The Registration Authority (RA) – optional component Digital Certificates (X.509 V3) -
Dec 2004Version 1 –Gather information –Make decision –Choose PKI vendors –Prepare infrastructure –Implement PKI
Dec 2004Version 1 also known as multi vendor interoperability – where different technologies from different vendors are used by different clients including different applications. Interoperability helps to support transactions between different parties that use different technology supplied by the different vendors
Dec 2004Version 1 Different policies for issued certificates Different features in PKI applications Different certificate storage and retrieval standards Different X.509 extensions Different obligations on certificate subjects Different PKI knowledge among organizational staff
Dec 2004Version 1 Hierarchical model Peer to Peer model also known as Mesh Model Bridge Model
Dec 2004Version 1
Dec 2004Version 1
Dec 2004Version 1
Dec 2004Version 1 Europe - ISA OASIS PKI Forum The Asia PKI Forum APEC
Dec 2004Version 1