Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Public Key Infrastructure, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Public Key Infrastructure is a framework that is used to create a secure method for exchanging of information via a public network based on public key cryptography. It is primarily founded on the certification authority. A certification authority issues a digital certificate to organizations and individuals, which is used to authenticate their identity over public networks such as the internet. This certificate is also used to sign messages, which ensures that they have not been tampered with. The framework also makes use of directory services meant to store or revoke digital certificates (Rouse, 2006).
A Public Key Infrastructure works by use of public key cryptography, a method commonly used on the internet for message encryption and authentication. Cryptography traditionally entails the creation and sharing of a secret key, used when sending, and encrypting of messages as well as receiving and decryption of the same message. It, however, runs the risk of someone else being able to decrypt the message if they intercept the key. Public Key Infrastructure consists of a Certificate Authority (CA), which assigns and validates digital certificates, a Registration Authority (RA), which validates the certificate authority before issuing of an electronic license to a requester, a directory that holds the certificates, and a system that manages certificates. A digital certificate includes information about the public key or the public key itself (Rouse, 2006).
Rouse (2006), explains that the framework works through generation of a public and private key using the same algorithm by a certificate authority. The public key is made available to the public through a directory that can be publicly accessed. This forms part of the digital signature. The private key is only given to the requesting party and is not made public, shared with another party or sent via the internet. Anyone who can find the public key from the public directory can send an encrypted message. The private key is then used to decrypt the sent message. In addition to encrypting of the message on transit, the sender can authenticate himself or herself using their private key to encrypt the digital certificate.
Certificate Authorities can be either in-house or public. Public Certificate Authorities are third-party companies that can issue and revoke compromised digital certificates to requesting organizations. In-house certificate authorities are an implementation of an organization used, by the organization, to authenticate employees accessing the organization’s network infrastructure. An in-house certification authority is advantageous in that it is simple and easy to manage. Since there are no third party bodies to depend on for certification, it eliminates the cost per certificate expense when issuing certificates, and is cheaper to configure and expand the public key infrastructure. Most importantly, an internal certificate authority can be integrated in Active Directory with a Microsoft Windows environment. In addition, the auto-enrollment feature, in Windows Server 2003 and above, can be used to simplify issuing of certificates further. The only drawbacks for an internal CA are that implementation of the internal CA is more complicated than with an external one, the organization shoulders all accountability and security issues of their network, certificate management overhead is meant by the company, and other organizations may find it hard to trust certificates from internal CAs. The benefits of an external CA are that the external party handles accountability and network security, organizations find it easier to trust certificates signed by trusted external CAs, and the overhead of certificate management is cheaper on the organization. However, its disadvantages are limited integration of an external CA’s infrastructure with the organization’s infrastructure, the cost per certificate incurred when issuing digital certificates and the reduced flexibility experienced configuring, expanding and managing the certificates (Comparison between Internal and External Certificate Authorities, 2010).
Given the specific organization and its infrastructure, it stands to reap more benefits with an in-house certificate authority for their public key infrastructure framework. The main reason is that, the organization is already using a Microsoft Server 2008 Active Directory. With this, the integration of an in-house certificate authority becomes much easier for them and in addition, issuing of certificates will be simplified further by the use of the auto-enrollment feature in Windows Server already embedded in their infrastructure. This will significantly reduce the cost of implementation and management given their lean stuffing on network administrators. The cost of starting the public key infrastructure is greatly reduced by the already existing hardware and software components within the company and thus the best option is to establish an in-house certificate authority (Posey, 2006).
References
(2010). Comparison between Internal and External Certificate Authorities. mniSecu.com.
http://www.omnisecu.com/security/public-key-infrastructure/comparison-between-internal-and-external-certificate-authority-ca.htm
Posey, B. (2006). Determining Whether an In-house or an External Certificate Authority is
More Appropriate for your Company. Window Security.com. Retrieved from http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/InHouse-External-Certificate-Authority-More-Appropriate.html
Rouse, M. (2006). PKI (Public Key Infrastructure). Retrieved from
http://searchsecurity.techtarget.com/definition/PKI
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee