What is Public Key Infrastructure (PKI)?
Q: Explain the concept of public key infrastructure (PKI).
- Cryptography
- Mid level question
Explore all the latest Cryptography interview questions and answers
ExploreMost Recent & up-to date
100% Actual interview focused
Create Cryptography interview for FREE!
Public Key Infrastructure (PKI) is a security mechanism used to enable secure communication over the internet. It is a set of hardware, software, people, policies, and procedures that work together to create, manage, distribute, store, and revoke digital certificates and public-private key pairs. PKI is used to ensure that data is not intercepted, altered, or otherwise tampered with in any way during transmission.
The core components of a PKI system include:
• A Certificate Authority (CA) that issues digital certificates to individuals, organizations, and applications.
• A Registration Authority (RA) that verifies the identity of individuals or organizations before issuing certificates.
• A Key Recovery Agent (KRA) that stores copies of the private keys associated with certificates so they can be recovered if lost or stolen.
• A Certificate Revocation List (CRL) that contains a list of revoked or expired certificates.
• A Certification Policy and Practice Statement (CPPS) that outlines the policies and procedures for issuing and managing certificates in the PKI system.
When a user wants to send a secure message to another user, they both need to have digital certificates issued by the same CA. The sender's certificate contains their public key, which is used to encrypt the message. The recipient's certificate contains their private key, which is used to decrypt the message.
To ensure the integrity of the message, the sender also digitally signs it with their private key. The recipient can then verify the signature with the sender's public key.
This process ensures that the message is encrypted and authenticated, meaning that it cannot be intercepted, altered, or tampered with in any way. It also ensures that the message comes from the person or organization that claims to have sent it.
The core components of a PKI system include:
• A Certificate Authority (CA) that issues digital certificates to individuals, organizations, and applications.
• A Registration Authority (RA) that verifies the identity of individuals or organizations before issuing certificates.
• A Key Recovery Agent (KRA) that stores copies of the private keys associated with certificates so they can be recovered if lost or stolen.
• A Certificate Revocation List (CRL) that contains a list of revoked or expired certificates.
• A Certification Policy and Practice Statement (CPPS) that outlines the policies and procedures for issuing and managing certificates in the PKI system.
When a user wants to send a secure message to another user, they both need to have digital certificates issued by the same CA. The sender's certificate contains their public key, which is used to encrypt the message. The recipient's certificate contains their private key, which is used to decrypt the message.
To ensure the integrity of the message, the sender also digitally signs it with their private key. The recipient can then verify the signature with the sender's public key.
This process ensures that the message is encrypted and authenticated, meaning that it cannot be intercepted, altered, or tampered with in any way. It also ensures that the message comes from the person or organization that claims to have sent it.


