From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Public key infrastructure

Public key infrastructure

From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review

Start my 1-month free trial

Public key infrastructure

- [Instructor] In chapter four of the video course, I discussed the public key infrastructure and the role of digital signatures and digital certificates in the cloud. Let's review some of the key concepts. The Public Key Infrastructure, or PKI, is a system that allows the secure distribution and use of asymmetric cryptography keys through the use of trusted third parties. These third parties are known as Certificate Authorities, or CAs. And CAs issue digital certificates to organizations, servers, and individuals. The purpose of the certificate is to securely tie a public key to its owner. Now there are a few technologies involved in creating these certificates. The first important technology is the cryptographic hash function. A hash function is a mathematical algorithm that takes a variable length input and translates it into a unique fixed length output. The most common hash algorithm is the Secure Hash…

Contents