LLMpediaThe first transparent, open encyclopedia generated by LLMs

Public Key Infrastructure

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: TLS Hop 3
Expansion Funnel Raw 71 → Dedup 11 → NER 10 → Enqueued 8
1. Extracted71
2. After dedup11 (None)
3. After NER10 (None)
Rejected: 1 (not NE: 1)
4. Enqueued8 (None)
Similarity rejected: 1
Public Key Infrastructure
NamePublic Key Infrastructure

Public Key Infrastructure Public Key Infrastructure is a framework for managing cryptographic keys, digital certificates, and trust relationships to secure electronic communications and transactions. It underpins authentication, confidentiality, integrity, and non-repudiation in numerous technical and regulatory contexts. PKI integrates standards, protocols, software, and institutions to issue, distribute, revoke, and audit public-key credentials across diverse platforms.

Overview

PKI combines key generation, certificate issuance, and trust validation to enable secure interactions among entities such as Microsoft Corporation, Mozilla Foundation, Apple Inc., Google LLC, and Amazon Web Services. It evolved alongside milestones like the RSA invention and initiatives by Internet Engineering Task Force, National Institute of Standards and Technology, European Union Agency for Cybersecurity, and commercial CAs including DigiCert, Entrust, and Let's Encrypt. PKI operates within regulatory and standards ecosystems influenced by instruments such as the eIDAS Regulation, FIPS 140-2, and guidance from International Organization for Standardization committees.

Components and Architecture

Core components include Certificate Authorities (CAs), Registration Authorities (RAs), certificate repositories, and revocation services—roles embodied by organizations like GlobalSign, Comodo (Sectigo), VeriSign, Symantec in historic contexts. Hardware Security Modules (HSMs) from vendors such as Thales Group and Yubico protect key material. Protocols and standards shaping architecture include X.509, Online Certificate Status Protocol, Certificate Revocation List, and Transport Layer Security. PKI topologies range from hierarchical single-root models used by national identity programs (e.g., Estonian ID-card system) to mesh and bridge architectures adopted by federations like those in eduGAIN and corporate federations in SAML deployments.

Cryptographic Principles and Certificate Management

Public-key algorithms such as RSA, ECC families (including curves standardized by SECG), and post-quantum candidates from projects like NIST Post-Quantum Cryptography underpin PKI. Certificate lifecycle processes—key generation, enrollment, issuance, renewal, suspension, and revocation—are operationalized by software from vendors like Microsoft Active Directory Certificate Services, OpenSSL, and EJBCA. Certificate formats and extensions rely on ASN.1 and X.509 profile specifications; timestamping and code-signing integrate with infrastructures like RFC 3161 timestamp authorities and vendor ecosystems such as Microsoft Authenticode and Apple Developer ID. Certificate transparency and logging initiatives reference projects and organizations such as Google Certificate Transparency and browser vendors including Mozilla Foundation and Apple Inc. for ecosystem trust.

Trust Models and Governance

Trust anchors and chain validation are governed by policies from commercial CAs, governmental root programs (e.g., US Federal PKI), and browser/root store operators like Mozilla Foundation and Microsoft Corporation. Models include hierarchical trust (root–intermediate–end-entity), web-of-trust variants seen in PGP, and federated trust as applied in eduGAIN and Shibboleth. Governance bodies and standard setters such as IETF, ISO/IEC JTC 1, NIST, and regional regulators like European Commission influence baseline requirements, audits, and compliance. Industry-driven baseline requirements and audit frameworks involve entities like the CA/Browser Forum and audit firms including KPMG and Deloitte in assessment roles.

Security Threats and Mitigations

Threats include CA compromise events exemplified by incidents involving DigiNotar and historical issues with Symantec-issued certificates, as well as man-in-the-middle attacks leveraging fraudulent issuance, key exfiltration from vulnerable HSMs, and cryptanalytic advances against algorithms like RSA. Mitigations encompass multi-party controls, hardware-backed key storage from Yubico and Thales Group, certificate transparency logs promoted by Google LLC, strict auditing per WebTrust and SOC 2 frameworks, and migration to resilient algorithms advocated by NIST. Operational practices such as key rotation, OCSP stapling used by web servers like those running Apache HTTP Server or Nginx, and DNS-based Authentication of Named Entities deployments informed by standards from IETF reduce exposure.

Applications and Use Cases

PKI supports HTTPS/TLS used by Google LLC services and web platforms, secure email with standards like S/MIME adopted by enterprises including IBM, document signing in government e-services such as UK Government digital signature programs, VPN authentication for vendors like Cisco Systems, and smart card identity systems exemplified by Common Access Card (CAC). It's integral to code-signing workflows for software distributed via Microsoft Store and Apple App Store, IoT device authentication in ecosystems from Amazon Web Services IoT, and blockchain-adjacent identity provisioning explored by research groups at MIT and Stanford University.

Legal and policy frameworks include electronic signature laws such as the eIDAS Regulation in the EU and the Electronic Signatures in Global and National Commerce Act in the US, which affect admissibility and standards for certificate use. Procurement and operational controls reflect audit standards like FIPS 140-2 validation of cryptographic modules, contractual terms with CAs, and incident notification requirements present in regulations enforced by authorities such as the European Data Protection Board and national cybersecurity agencies like CISA. Operationally, organizations integrate PKI with identity and access management platforms from vendors like Okta, Ping Identity, and Microsoft Azure Active Directory to enforce lifecycle, monitoring, and compliance.

Category:Cryptography