• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

Public Key Infrastructure and X.509 Public Key Certificates

February 7, 2024 by David Lanter 12 Comments

Filed Under: 05 - Secure Networks Tagged With:

Reader Interactions

Comments

  1. Ooreofeoluwa Koyejo says

    February 10, 2024 at 9:07 pm

    PKI is a public key cryptographic management framework for securely issuing, distributing, and revoking public key certificates and associated cryptographic keys while X.509 public key certificates are used to bind cryptographic keys to entities, securely sharing public keys and verifying the identity of certificate holders, establishing trust relationships between entities in a PKI environment. PKI provides the infrastructure and processes necessary for managing X.509 certificates. PKI and X.509 public key certificates are interdependent components of cryptographic systems.

    Log in to Reply
    • Celinemary Turner says

      February 12, 2024 at 8:28 pm

      This is thorough and insightful overview of PKI and its relationship with X.509 public key certificates, highlighting their importance in securing cryptographic systems and establishing trust relationships between entities.

      Log in to Reply
  2. Yannick Rugamba says

    February 11, 2024 at 2:00 pm

    Key recovery is an important consideration in PKI planning to allow decryption of data if a private key is lost. The article notes that encrypted private keys can be stored on a key recovery server to enable retrieval if needed, rather than permanent data loss.

    Log in to Reply
    • Jon Stillwagon says

      February 13, 2024 at 4:11 pm

      Yannick, Key recovery is an important part of PKI and it keeps the availability goals met when it comes to needed the information whenever needed especially if you lose the key. You made a good point about how key recovery can solve problems like data loss which can affect the company really bad.

      Log in to Reply
  3. Bo Wang says

    February 11, 2024 at 4:05 pm

    Public key encryption uses key pairs to encrypt and decrypt content, where one key is public (public key) and the other is private (private key). Messages can be encrypted using a public key and can only be decrypted by someone who has the corresponding private key.

    Log in to Reply
  4. Eyup Aslanbay says

    February 11, 2024 at 6:42 pm

    The article summarizes Public Key Infrastructure, detailing its components: a certificate authority, registration authority, certificate database, store, and a key archive server. It describes the process of hashing information by the certificate authority and encryption using a private key, emphasizing the importance of keeping the private key secret to prevent data leaks.

    Log in to Reply
  5. Celinemary Turner says

    February 11, 2024 at 7:18 pm

    Public Key Infrastructure (PKI) issues a digital certificate to secure in transit sensitive data. PKI certificate provides an attestation that it belongs to a specific company. The PKI elements are Certificate authority, Registration authority, Certificate database, and Certificate policy. Registration authority verifies the company that is requesting the digital certificate. The Certificate Database holds the information on the certificates. Certificate policy defines the procedures of PKI. Hence. the x.509 defines the formats of the PKI certificates. The certificate is a signed data structure that binds a public key to an entity.

    Log in to Reply
    • Eyup Aslanbay says

      February 13, 2024 at 11:20 pm

      Public Key Infrastructure, highlighting its role in securing sensitive data in transit through digital certificates, which verify company identity. It covers PKI’s key elements: Certificate Authority, Registration Authority, Certificate Database, and Certificate Policy, and notes the X.509 standard for certificate formatting.

      Log in to Reply
  6. Edge Kroll says

    February 11, 2024 at 8:49 pm

    Public Key Infrastructure (PKI) is a system that manages the creation, distribution, and verification of digital keys and certificates. PKI relies on the use of asymmetric cryptography, employing a pair of keys a public key and a private key to secure digital communication. The public key is made widely available, while the private key is kept confidential. PKI issues digital certificates that bind individuals or entities to their public keys. These certificates verify the authenticity of the public keys, which enables things like secure online transactions and encrypted communication.

    Log in to Reply
    • Celinemary Turner says

      February 12, 2024 at 8:25 pm

      Your summary effectively communicates the significance of PKI in ensuring the security and integrity of digital communication.

      Log in to Reply
  7. Jon Stillwagon says

    February 11, 2024 at 11:08 pm

    The article is about public key infrastructure and how public key cryptography is used to encrypt and decrypt content that is sent to one another. It talks about how the public key works and the use of a certificate to help identify the person who is going to open the message. It all helps keep things confidential, so others won’t be able to get into their messages and read what they are sending to each other. The key items that are listed in a public key infrastructure are a certification authorities, certificate directory, key recovery server.

    Log in to Reply
    • Celinemary Turner says

      February 12, 2024 at 8:06 pm

      Your summary provides a clear and accurate summary of PKI and its key components, highlighting its importance in ensuring secure and confidential communication over public networks.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in