Skip to main content

Questions tagged [public-key-infrastructure]

A public-key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). There are three main categories of PKI: Web / SSL certs, corporate networks, and Government ID / ePassport.

Filter by
Sorted by
Tagged with
13 votes
3 answers
2k views

The government of Kazakhstan, in order for citizens to use electronic government services (egov.kz), requires installing the NCALayer application on the computer for working with digital signatures. ...
sunvis0r's user avatar
  • 131
1 vote
1 answer
279 views

TL;DR: I want to forward-chain client certificates by including their successor public key as an extension. See Questions. I am thinking about using client-side certificates in TLS (mTLS) as a more ...
Karsten's user avatar
  • 11
3 votes
1 answer
1k views

I do not know much about how MS Windows interprets client certificates but I was faced with a statement I have a hard time integrating. The context: organization EXAMPLE has an Active Directory and an ...
WoJ's user avatar
  • 9,238
3 votes
1 answer
4k views

I’m in the process of developing a native app and am currently trying to come up with a workflow to secure the communication between my app and the server. I’ve done a lot of research and have not ...
Rhubarb's user avatar
  • 41
0 votes
1 answer
130 views

GPG allows file encryption for multiple recipients. I prefer to encrypt files: Only to recipient subkeys shared with me by the intended recipients, like so: $ gpg --encrypt --armor --recipient <...
Suhas Srivastava's user avatar
2 votes
0 answers
145 views

I`m working on a project for improving security of IoT devices by using per device X.509 certificate for authentication. The company uses IoT sensors, created inhouse, to gather data for analytics. ...
Zapo's user avatar
  • 21
5 votes
5 answers
3k views

About TLS Client Certificates How does a TLS client certificate prove the identity of the client? Yes, only the client has the private key so a client-key handshake can be completed. But how does that ...
WoodManEXP's user avatar
5 votes
2 answers
1k views

I understand that each certificate can have a CRL distribution point (extension 2.5.29.31) – or even multiple ones, but let's not consider that for the moment. Let's assume we have a root CA > ...
not2savvy's user avatar
  • 824
12 votes
3 answers
2k views

With all currently ongoing global conflicts in the world, I was thinking about removing default trusted certificate authorities root certificates that are from countries that are (no longer) ...
Bob Ortiz's user avatar
  • 7,725
2 votes
1 answer
255 views

Internet.nl checks a domain for some security settings among which: Route Origin Authorisation existence and Route announcement validity for both the webserver and nameserver IP addresses. They write: ...
Bob Ortiz's user avatar
  • 7,725
1 vote
0 answers
214 views

While debugging yesterday's Cloudflare incident, I found out their intermediate certificate issuer field differ from its signing CA subject, despite the AKI/SKI were correct. Here's the relevant CA ...
whitenoisedb's user avatar
1 vote
0 answers
113 views

RFC6605: Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC has this example of a P-256 key: Private-key-format: v1.2 Algorithm: 13 (ECDSAP256SHA256) PrivateKey: GU6SnQ/Ou+...
neubert's user avatar
  • 1,830
1 vote
1 answer
375 views

The certificate has the fields Signature algorithm and Signature hash algorithm, which determine what algorithm the certificate was signed with, and Public key, which determines what algorithm the ...
olkhovskiiooo's user avatar
0 votes
1 answer
267 views

Security Noob here. I am trying to build a secure passwordless login mechanism for my webservice. The authentication mechanisms My idea is to encourage the users to use the following two login methods:...
2f8n's user avatar
  • 1
2 votes
1 answer
879 views

Let's assume I have 3 computers, each with its embedded TPM. I also have a pair of asymmetric keys, which I created elsewhere. I want to store & import the same external private key I have created ...
RangerOri's user avatar
  • 121

15 30 50 per page
1
2 3 4 5
92