Public Key Security: Difference between revisions
Jump to navigation
Jump to search
Line 19: | Line 19: | ||
=Public Key Infrastructure (PKI)= | =Public Key Infrastructure (PKI)= | ||
A ''public key infrastructure'' (PKI) is a set of roles, policies and procedures needed to create, manage, distribute, use, store, and revoke [[#Certificate|digital certificates]] and manage public-key encryption. | |||
=Certificate= | =Certificate= |
Revision as of 23:30, 7 April 2018
Internal
Overview
X.509
SSL/TLS
Transport Layer Security (TLS) is the successor of Secure Sockets Layer (SSL). They are both cryptographic protocols designed to provide communications security over a computer network. The client/server pair use a symmetric key to encrypt the communication. The symmetric key is unique and generated for each connection, as part of a protocol exchange that involves pair's public and private keys. For more details, see:
Asymmetric Cryptography
Public Key Infrastructure (PKI)
A public key infrastructure (PKI) is a set of roles, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.