logo

Public-Key Infrastructure (PKI) - Importance, Working, and Benefits

   

Added on  2022-12-15

10 Pages2275 Words404 Views
Public-Key
Infrastructure (PKI)
Part-A
Public-Key Infrastructure (PKI) - Importance, Working, and Benefits_1
Table of Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................3
Replay attacks.........................................................................................................................3
Obtaining a digital certificate.................................................................................................3
Digital signatures....................................................................................................................4
CONCLUSION................................................................................................................................6
References:.......................................................................................................................................8
Public-Key Infrastructure (PKI) - Importance, Working, and Benefits_2
INTRODUCTION
Objectives
The following discussion is made on the cryptography and its importance, working of
asymmetric cryptography and its benefits over symmetric cryptography, concept of replay
attacks against PKI, obtaining a digital certificate and digital signatures.
Cryptography
It is defined as a technique through which information or data can be protected while
communicating or transferring it with help of private codes so that confidential data can be saved
from losing or breaches (Höglund, Lindemer, Furuhed and Raza, 2020). This is done so that only
those people could be able to access the particular information and can read and write the same
in a similar manner for the feedback. Cryptography is divided by its meaning such as crypt
means hidden or vault and graphy means writing. It is also the field of study or practice of
methods for safe and secure communication of information from place to another with full
security in the presence of adversaries also known as third parties either they are involved in an
intentional or an unintentional manner. There are three types of cryptography are available such
as secret key, public key and hash function. Secret key is also known as the private key or
symmetric cryptography used to encrypt and decrypt the personal messages which contain
private information. Public key is also known as the asymmetric cryptography which uses the
keys in pairs of public and private keys, these are dependent on the mathematical problems
which are termed as one way functions. Hash function is a mathematical algorithm that maps
information of arbitrary size to a bit array of a fixed size used to encrypt or decrypt messages to
secure the information.
Importance of cryptography
Confidentiality is one of the importance of cryptography which means that it holds back
the privacy of data and information by maintaining the confidentiality of it for better transfer of
data. Identification and authentication is an another importance of cryptography which means
that it recognises and authenticates the data and information to be put in how much security and
encoding requirements of it so that most important data can be more secure and vice versa.
Integrity is also the one of the importance of cryptography which means that it supports the data
to be integrated with the safety and security so that information cannot get leaked. Assurance of
right sender or receiver is also an another importance of cryptography which means that it aids in
1
Public-Key Infrastructure (PKI) - Importance, Working, and Benefits_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security Question Answer 2022
|6
|875
|10

Network Security: Cryptography, Data in Transit and Rest, Cloud Computing
|10
|1928
|459

CSI2102 - Information Security Technologies | Case Study
|14
|3537
|42

Symmetric Key Encryption | Assignment
|6
|2152
|151

Network Security in SSL Communication
|12
|1639
|396

Uses Of Cryptography Techniques
|8
|3872
|245