Verified Document

Public Key Infrastructure Email Communication Has Strongly Case Study

Public Key Infrastructure Email communication has strongly increased in the last couple of years and its still growing. It's hard to find a company which doesn't use email to run its business processes both within the company and with external business partners and clients. Therefore, the eminent security threat to the company's network infrastructure and content of the company products should be priories. The use of Public Key Infrastructure (PKI) would eliminate the threat. Public key infrastructure (PKI) can be defined as the use of public key and private key pair for authentication and proof content (H Johner, 2010).

Its combined hardware and software component, policies and different procedures together to avail stick security regulation. The public key infrastructure (PKI) is called certificate and work as digital indemnification. It offers certainty of quality of information sent and received electronically and the source and destination of such information. The information with a public key infrastructure can be used as assurance or evidence before the court law (IQ Suite, 2009).

However, there are varies component of public key infrastructure (PKI) which is used to maintain high security of emails and other data component of a company. Such uses encryption, digital signatures, public keys, private keys, digital certificates, certificate authorities, certificate revocation and storage when sending an email. This it protect the content of the data or information being convey (IQ Suite, 2009).

Digital Certification

Digital Certification is an attachment to an electronic message used for security purposes. It's most common used...

Therefore, an individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA).
The CA issues an encrypted digital certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply (Adonis, 2005).

The digital certification compost of a sender public key, sender name, expiration data of the sender key, name of the certificate issuer, serial number of the certificate and digital signature of the issuer. This to ensure that every information or email sent is highly secure and can't be accessed by any unauthorized person (R Kohlas, 2009).

Certificate Authority

A certificate authority (CA) is an authority in a network that issues and manages security credentials and public keys for message encryption. This is part of a public key infrastructure (PKI), a CA checks with a registration authority (RA) to verify information provided by the requestor of a digital certificate. If the registration authorization verifies the requestor's information, then the certificate authority can then issue a certificate. After that…

Sources used in this document:
Reference

IQ Suite (2009). Public-Key Infrastructures and the Encryption Methods PGP and S/MIME

PKI Fundamentals -- iQ

Adonis (2005). An Introduction to PKI (Public Key Infrastructure)

Site: http://www.articsoft.com/public_key_infrastructure.htm
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now