Public Key Infrastructure (PKI) 🌐🔒

Overview of PKI 🛡️

  • Definition:

    • PKI is a framework for managing digital certificates and public-key encryption, crucial for securing communications on the Internet.

    • Components: PKI involves the creation, storage, and distribution of digital certificates.

Digital Certificates 📜

  • Purpose:

    • A digital certificate verifies that an entity owns a particular public key.

    • Contents:

      • Public key

      • Entity information

      • Digital signature from a Certificate Authority (CA) confirming the validity.

  • Trust Model:

    • If the certificate's signature is valid and trusted, the public key can be used for secure communication.

Certificate Authority (CA) & Registration Authority (RA) 🏛️

  • CA:

    • Responsible for issuing and signing certificates.

    • Ensures the integrity and authenticity of certificates.

  • RA:

    • Verifies the identities of entities requesting certificates.

    • Often combined with CA roles for simplicity.

Certificate Types 🔐

  • SSL/TLS Server Certificate:

    • Used to establish secure connections between a web server and client (e.g., web browsers).

    • Ensures that the client can trust the server's identity.

    • Wildcard Certificates: Valid for multiple hostnames within a domain.

    • Self-Signed Certificates: Signed by the same entity that issues them, less trusted without prior endorsement.

  • SSL/TLS Client Certificate:

    • Used to authenticate the client to the server.

    • Typically issued by an internal CA, not a public one.

  • Code Signing Certificates:

    • Used to sign executable programs to verify their integrity and origin.

    • Helps users ensure that applications are not tampered with and come from the legitimate author.

Chain of Trust 🔗

  • Root Certificate Authority:

    • The starting point of the trust chain.

    • Self-signed because no higher authority can validate them.

    • Signs other certificates and creates a hierarchical structure.

  • Intermediate CAs:

    • Subordinate to the root CA.

    • Can sign additional certificates and extend the chain of trust.

  • End-Entity (Leaf) Certificates:

    • Issued to end-users or applications.

    • Represents the final point in the certificate hierarchy without additional signing authority.

Trust Distribution 🌍

  • Root CA Distribution:

    • Trust in root CAs is established through pre-installed root certificates in operating systems and browsers.

    • Major OS vendors and browsers distribute and manage these certificates to bootstrap the chain of trust.

🔒📜🔗

Last updated