Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
What are the specific components of the Public Key Infrastructure (PKI)?
Home
Cryptography
What are the specific components of the Public Key Infrastructure (PKI)?
0
votes
asked
Jun 5, 2021
in
Cryptography
by
SakshiSharma
What are the specific components of the Public Key Infrastructure (PKI)?
specific-components
pki
public-key-infrastructure
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Jun 5, 2021
by
SakshiSharma
The PKI consists of the following components:
The Certificate Authority (CA): This is the party who issues the digital certificates
The Digital Certificate: This serves to verify the identity of the certificate holder and is issued by the CA. These digital certificates are typically kept in the local computer of the employee, or even the central server at the place of business or organization
The LDAP or X.500 Directories: These are the databases which collect and distribute the digital certificates from the CA
The Registration Authority (RA): If the place of business or organization is very large (such as a multinational corporation), this entity usually handles and processes the requests for the required digital certificates and then transmits those requests to the CA to process and create the required digital certificates
Related questions
0
votes
Q: How does the Public Key Infrastructure (PKI) work?
asked
Jun 5, 2021
in
Cryptography
by
SakshiSharma
pki
public-key-infrastructure
0
votes
Q: What is the Public Key Infrastructure (PKI)?
asked
Jun 5, 2021
in
Cryptography
by
SakshiSharma
public-key-cryptography
pki
0
votes
Q: What is the LDAP protocol and how is it used in a Public Key Infrastructure (PKI)?
asked
Jun 5, 2021
in
Cryptography
by
SakshiSharma
ldap-protocol
public-key-cryptography
0
votes
Q: What is the difference between a private key and a public key?
asked
Jun 4, 2021
in
Cryptography
by
SakshiSharma
public-key
private-key
0
votes
Q: A company has decided to implement an electronic signature scheme based on public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a
asked
May 20, 2023
in
CISA
by
Robindeniel
public
key
infrastructure
+1
vote
Q: Hybrid cloud is an integration of both on-premise and public cloud infrastructure.
asked
Feb 20, 2022
in
Amazon ECS and Storage Gateway
by
rajeshsharma
on-premise-instrastructure
0
votes
Q: What are the key differences between asymmetric and symmetric cryptography?
asked
Jun 5, 2021
in
Cryptography
by
SakshiSharma
asymmetric-key
symmetric-key
0
votes
Q: What are the disadvantages of symmetric key cryptography?
asked
Jun 4, 2021
in
Cryptography
by
SakshiSharma
symmetric-key
cryptography-key
0
votes
Q: What are symmetric and asymmetric key systems?
asked
Jun 4, 2021
in
Cryptography
by
SakshiSharma
symmetric-key
asymmetric-keys-system
0
votes
Q: What are the components of VM infrastructure?
asked
Aug 25, 2023
in
Operating System
by
JackTerrance
enable-virtualization-windows
...