As the PKI is a general overview of methods, technologies and techniques that provide a secure internet as well as the usage of public key and private key pair for authentication and proof of content, the PKI is able to provide:
- certainty of the quality of information sent and received electronically
- certainty of source and destination of that information
- certainty of the privacy of the information
- as well as assurance that the information will be kept in such a way that it can be introduced as evidence in a court of law.
The PKI also consists of a certificate authority, which issues and verifies the digital certificate, in which is
an electronic document that uses a digital signature to bind a public key with the identity, i.e. the name or address of a person or organization. The certificate is used to verify that a public key belongs to the correct individual.
As stated above, the digital certificate provides a method of storing the public key, however in the storing of private keys, more secure measures are needed. Passwords or biometric encryption such as thumbprints can be used to ensure the security of a private key, as with the private key, the attacker can have access to more sensitive information regarding the user or his/ her organization.
Other components that make up the PKI are such as a Registration Authority (RA) which is used by a CA. The RA performs necessary checks on the person or company requesting the certificate so as to ensure they are really who they say they are. The RA may seem like a CA to the person or company but they do not sign or validate the issued certificate. Therefore, its only purpose is to ensure that the CA issues certificates to trusted people or companies only.
Sources: