<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ko">
	<id>https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0</id>
	<title>공개 키 기반 구조 - 편집 역사</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0"/>
	<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0&amp;action=history"/>
	<updated>2026-04-05T10:21:00Z</updated>
	<subtitle>이 문서의 편집 역사</subtitle>
	<generator>MediaWiki 1.35.0</generator>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0&amp;diff=51194&amp;oldid=prev</id>
		<title>2021년 2월 17일 (수) 08:00에 Pythagoras0님의 편집</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0&amp;diff=51194&amp;oldid=prev"/>
		<updated>2021-02-17T08:00:36Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2021년 2월 17일 (수) 08:00 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l112&quot; &gt;112번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;112번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 메타데이터 ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==메타데이터==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q658476 Q658476]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q658476 Q658476]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===Spacy 패턴 목록===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LOWER&amp;#039;: &amp;#039;public&amp;#039;}, {&amp;#039;OP&amp;#039;: &amp;#039;*&amp;#039;}, {&amp;#039;LOWER&amp;#039;: &amp;#039;key&amp;#039;}, {&amp;#039;LEMMA&amp;#039;: &amp;#039;infrastructure&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LEMMA&amp;#039;: &amp;#039;PKI&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0&amp;diff=46991&amp;oldid=prev</id>
		<title>Pythagoras0: /* 메타데이터 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0&amp;diff=46991&amp;oldid=prev"/>
		<updated>2020-12-26T12:13:39Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;메타데이터: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2020년 12월 26일 (토) 12:13 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l111&quot; &gt;111번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;111번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;== 메타데이터 ==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===위키데이터===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* ID :  [https://www.wikidata.org/wiki/Q658476 Q658476]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0&amp;diff=46337&amp;oldid=prev</id>
		<title>Pythagoras0: /* 노트 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EA%B3%B5%EA%B0%9C_%ED%82%A4_%EA%B8%B0%EB%B0%98_%EA%B5%AC%EC%A1%B0&amp;diff=46337&amp;oldid=prev"/>
		<updated>2020-12-21T14:34:13Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;노트: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;새 문서&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== 노트 ==&lt;br /&gt;
&lt;br /&gt;
===위키데이터===&lt;br /&gt;
* ID :  [https://www.wikidata.org/wiki/Q658476 Q658476]&lt;br /&gt;
===말뭉치===&lt;br /&gt;
# The most distinct feature of Public Key Infrastructure (PKI) is that it uses a pair of keys to achieve the underlying security service.&amp;lt;ref name=&amp;quot;ref_0a9e5bff&amp;quot;&amp;gt;[https://www.tutorialspoint.com/cryptography/public_key_infrastructure.htm Public Key Infrastructure]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# PKI provides assurance of public key.&amp;lt;ref name=&amp;quot;ref_0a9e5bff&amp;quot; /&amp;gt;&lt;br /&gt;
# The most crucial concept involved in PKI is, as its name implies, the public cryptographic keys that are at its core.&amp;lt;ref name=&amp;quot;ref_0f6e1165&amp;quot;&amp;gt;[https://www.csoonline.com/article/3400836/what-is-pki-and-how-it-secures-just-about-everything-online.html What is PKI? And how it secures just about everything online]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The most important concepts to understand to grasp how PKI works are keys and certificates.&amp;lt;ref name=&amp;quot;ref_0f6e1165&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI gets its name because each participant in a secured communications channel has two keys.&amp;lt;ref name=&amp;quot;ref_0f6e1165&amp;quot; /&amp;gt;&lt;br /&gt;
# So that covers how data is encrypted within a public key infrastructure.&amp;lt;ref name=&amp;quot;ref_0f6e1165&amp;quot; /&amp;gt;&lt;br /&gt;
# Our system of trust is based on a Public Key Infrastructure (PKI) using internally-hosted Certificate Authorities (CAs).&amp;lt;ref name=&amp;quot;ref_60a072fb&amp;quot;&amp;gt;[https://blog.cloudflare.com/how-to-build-your-own-public-key-infrastructure/ How to build your own public key infrastructure]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In this post we will describe how we built our PKI, how we use it internally, and how to run your own with our open source software.&amp;lt;ref name=&amp;quot;ref_60a072fb&amp;quot; /&amp;gt;&lt;br /&gt;
# Public key cryptography provides many mechanisms for trust, including PGP’s “web of trust” and HTTPS’s public key infrastructure (PKI) model.&amp;lt;ref name=&amp;quot;ref_60a072fb&amp;quot; /&amp;gt;&lt;br /&gt;
# We chose the PKI model because of ease of use and deployment.&amp;lt;ref name=&amp;quot;ref_60a072fb&amp;quot; /&amp;gt;&lt;br /&gt;
# To understand how PKI works, it’s important to go back to the basics that govern encryption in the first place.&amp;lt;ref name=&amp;quot;ref_adca3991&amp;quot;&amp;gt;[https://info.keyfactor.com/what-is-pki What is PKI? A Public Key Infrastructure Definitive Guide]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# PKI resolves this challenge by issuing and governing digital certificates that confirm the identity of people, devices or applications that own private keys and the corresponding public keys.&amp;lt;ref name=&amp;quot;ref_adca3991&amp;quot; /&amp;gt;&lt;br /&gt;
# In short, PKI assigns identities to keys so that recipients can accurately verify the owners.&amp;lt;ref name=&amp;quot;ref_adca3991&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI governs encryption keys by issuing and managing digital certificates.&amp;lt;ref name=&amp;quot;ref_adca3991&amp;quot; /&amp;gt;&lt;br /&gt;
# The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.&amp;lt;ref name=&amp;quot;ref_cb62f82c&amp;quot;&amp;gt;[https://en.wikipedia.org/wiki/Public_key_infrastructure Public key infrastructure]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In cryptography, a PKI is an arrangement that binds public keys with respective identities of entities (like people and organizations).&amp;lt;ref name=&amp;quot;ref_cb62f82c&amp;quot; /&amp;gt;&lt;br /&gt;
# The PKI role that may be delegated by a CA to assure valid and correct registration is called a registration authority (RA).&amp;lt;ref name=&amp;quot;ref_cb62f82c&amp;quot; /&amp;gt;&lt;br /&gt;
# this is incorrect according to the X.509 PKI standards.&amp;lt;ref name=&amp;quot;ref_cb62f82c&amp;quot; /&amp;gt;&lt;br /&gt;
# Public key infrastructure, or PKI – despite being a frequently used term, the mechanisms behind it can be quite difficult to understand.&amp;lt;ref name=&amp;quot;ref_51612996&amp;quot;&amp;gt;[https://www.pentasecurity.com/blog/how-pki-work/ How Does Public Key Infrastructure (PKI) Work? An Easy Guide]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# PKI is a general term that defines the technology used to encrypt and authenticate data during transmissions.&amp;lt;ref name=&amp;quot;ref_51612996&amp;quot; /&amp;gt;&lt;br /&gt;
# To explain how PKI works, we need to start by explaining its usage for authentication.&amp;lt;ref name=&amp;quot;ref_51612996&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI works by encrypting data (in this case, digital certificate) with a cryptographic key, while having a separate key for decrypting it.&amp;lt;ref name=&amp;quot;ref_51612996&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI (or Public Key Infrastructure) is the framework of encryption and cybersecurity that protects communications between the server (your website) and the client (the users).&amp;lt;ref name=&amp;quot;ref_3d77e20f&amp;quot;&amp;gt;[https://www.venafi.com/education-center/pki/how-does-pki-work How Does PKI Work [Public Key Infrastructure Guide]]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Through encryption and decryption, PKI is based on digital certificates that verify the identity of the machines and/or users that ultimately proves the integrity of the transaction.&amp;lt;ref name=&amp;quot;ref_3d77e20f&amp;quot; /&amp;gt;&lt;br /&gt;
# So how does PKI authentication work?&amp;lt;ref name=&amp;quot;ref_3d77e20f&amp;quot; /&amp;gt;&lt;br /&gt;
# Public Key Infrastructure is a complex subject, so you may be wondering if it actually performs encryption.&amp;lt;ref name=&amp;quot;ref_3d77e20f&amp;quot; /&amp;gt;&lt;br /&gt;
# Public Key Infrastructure (PKI) is a technology for authenticating users and devices in the digital world.&amp;lt;ref name=&amp;quot;ref_8a457871&amp;quot;&amp;gt;[https://www.ssh.com/pki/ What is PKI (Public Key Infrastructure)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# A public key infrastructure relies on digital signature technology, which uses public key cryptography.&amp;lt;ref name=&amp;quot;ref_8a457871&amp;quot; /&amp;gt;&lt;br /&gt;
# The main weakness of public PKI is that any certificate authority can sign a certificate for any person or computer.&amp;lt;ref name=&amp;quot;ref_8a457871&amp;quot; /&amp;gt;&lt;br /&gt;
# We participated in the standardization work for X.509v3 and proposed an alternative approach called Simple Public Key Infrastructure (SPKI) to address some of the trust issues with the X.509 standard.&amp;lt;ref name=&amp;quot;ref_8a457871&amp;quot; /&amp;gt;&lt;br /&gt;
# CAs underpin the security of a PKI and the services they support, and therefore can be the focus of sophisticated targeted attacks.&amp;lt;ref name=&amp;quot;ref_60072c57&amp;quot;&amp;gt;[https://cpl.thalesgroup.com/faq/public-key-infrastructure-pki/what-public-key-infrastructure-pki What is Public Key Infrastructure (PKI)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Users (also known as “Subscribers” in PKI parlance) can be individual end users, web servers, embedded systems, connected devices, or programs/applications that are executing business processes.&amp;lt;ref name=&amp;quot;ref_60072c57&amp;quot; /&amp;gt;&lt;br /&gt;
# A public key infrastructure (PKI) supports the distribution, revocation and verification of public keys used for public key encryption, and enables linking of identities with public key certificates.&amp;lt;ref name=&amp;quot;ref_40341f71&amp;quot;&amp;gt;[https://searchsecurity.techtarget.com/definition/PKI What is PKI (public key infrastructure)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# A PKI enables users and systems to securely exchange data over the internet and verify the legitimacy of certificate-holding entities, such as webservers, other authenticated servers and individuals.&amp;lt;ref name=&amp;quot;ref_40341f71&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI certificates include a public key used for encryption and cryptographic authentication of data sent to or from the entity that was issued the certificate.&amp;lt;ref name=&amp;quot;ref_40341f71&amp;quot; /&amp;gt;&lt;br /&gt;
# Without PKI, sensitive information can still be encrypted, ensuring confidentiality, and exchanged between two entities, but there would be no assurance of the identity of the other party.&amp;lt;ref name=&amp;quot;ref_40341f71&amp;quot; /&amp;gt;&lt;br /&gt;
# Public key infrastructure (PKI) is an example of a security infrastructure that uses both public and private keys.&amp;lt;ref name=&amp;quot;ref_d576521d&amp;quot;&amp;gt;[https://www.sciencedirect.com/topics/computer-science/public-key-infrastructure Public Key Infrastructure - an overview]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# PKI is targeted toward legal, commercial, official, and confidential transactions, and includes cryptographic keys and a certificate management system.&amp;lt;ref name=&amp;quot;ref_d576521d&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI uses one or more trusted systems known as Certification Authorities (CA), which serve as trusted third parties for PKI.&amp;lt;ref name=&amp;quot;ref_d576521d&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI trust is established by a certificate authority, which is an organization or governing body that can issue certificates and verify the identity of the certificate requestor.&amp;lt;ref name=&amp;quot;ref_acd80d7c&amp;quot;&amp;gt;[https://docs.aws.amazon.com/crypto/latest/userguide/awspki-whatis-toplevel.html What is public key infrastructure?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# To learn more about the terms and concepts used in PKI, see PKI Concepts.&amp;lt;ref name=&amp;quot;ref_acd80d7c&amp;quot; /&amp;gt;&lt;br /&gt;
# The purpose of a PKI is to manage the public keys used by the network for public key encryption, identity management, certificate distribution, certificate revocation, and certificate management.&amp;lt;ref name=&amp;quot;ref_5f50b316&amp;quot;&amp;gt;[https://www.securew2.com/blog/public-key-infrastructure-explained/ Public Key Infrastructure: Explained]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The PKI allows users and systems to verify the legitimacy of certificate-holding entities and securely exchange information between them over the air.&amp;lt;ref name=&amp;quot;ref_5f50b316&amp;quot; /&amp;gt;&lt;br /&gt;
# In a PKI system, the client generates a public-private key pair.&amp;lt;ref name=&amp;quot;ref_5f50b316&amp;quot; /&amp;gt;&lt;br /&gt;
# A Hardware Security Module isn’t a mandatory component of a PKI, but it improves the security of the PKI as a whole when implemented.&amp;lt;ref name=&amp;quot;ref_5f50b316&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI (Public Key Infrastructure), is a framework that enables the encryption of public keys and includes their affiliated crypto-mechanisms.&amp;lt;ref name=&amp;quot;ref_67bb1f76&amp;quot;&amp;gt;[https://www.appviewx.com/education-center/pki/ Role of Certificates in PKI]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The underlying purpose of any PKI setup is to manage the keys and certificates associated with it, thereby creating a highly secure network environment for use by applications and hardware.&amp;lt;ref name=&amp;quot;ref_67bb1f76&amp;quot; /&amp;gt;&lt;br /&gt;
# Assists the PKI cycle by verifying that the body requesting a certificate is legitimate.&amp;lt;ref name=&amp;quot;ref_67bb1f76&amp;quot; /&amp;gt;&lt;br /&gt;
# Certificates are the gatekeepers to ensuring that the underlying PKI works properly.&amp;lt;ref name=&amp;quot;ref_67bb1f76&amp;quot; /&amp;gt;&lt;br /&gt;
# Ever wondered what public key infrastructure (PKI) is and how it works?&amp;lt;ref name=&amp;quot;ref_b258a27a&amp;quot;&amp;gt;[https://www.thesslstore.com/blog/what-is-pki-a-crash-course-on-public-key-infrastructure-pki/ What Is PKI? A Crash Course on Public Key Infrastructure (PKI)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# But what is PKI and what does it entail for organizations and data privacy?&amp;lt;ref name=&amp;quot;ref_b258a27a&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI is an infrastructure that has become an essential part of our everyday lives — and the overwhelming majority of us don’t even know what it is!&amp;lt;ref name=&amp;quot;ref_b258a27a&amp;quot; /&amp;gt;&lt;br /&gt;
# But before we move on to answering the “what is PKI?” question and talking about how it works, let’s first consider a simple scenario.&amp;lt;ref name=&amp;quot;ref_b258a27a&amp;quot; /&amp;gt;&lt;br /&gt;
# A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology needed to manage digital certificates in a public key cryptography scheme.&amp;lt;ref name=&amp;quot;ref_2222afa5&amp;quot;&amp;gt;[https://www.enisa.europa.eu/topics/csirts-in-europe/glossary/public-key-infrastructure-pki Public Key Infrastructure (PKI)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Public keys are the basis for a Public Key Infrastructure when decrypting highly-sensitive data.&amp;lt;ref name=&amp;quot;ref_b1535d87&amp;quot;&amp;gt;[https://hubsecurity.io/what-is-public-key-infrastructure-pki/ What Is Public Key Infrastructure (PKI)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Many of today’s emerging technologies, especially within the fintech space, are becoming more and more reliant on PKI technology to guarantee security and protection of sensitive data.&amp;lt;ref name=&amp;quot;ref_b1535d87&amp;quot; /&amp;gt;&lt;br /&gt;
# In PKI, digital certificates are used to associate a public key of a private-public key-pair (i.e. RSA, ECC) with the identity of its owner.&amp;lt;ref name=&amp;quot;ref_a34a1b54&amp;quot;&amp;gt;[https://doubleoctopus.com/security-wiki/digital-certificates/public-key-infrastructure/ What is Public Key Infrastructure (PKI?)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The Microsoft PKI assessment provides an insight into the health of your organization’s Microsoft Active Directory Certificate Services (ADCS) environment.&amp;lt;ref name=&amp;quot;ref_cdcb6c19&amp;quot;&amp;gt;[https://www.sss.co.nz/solutions/identity-and-access-management/machine-identity-protection/public-key-infrastructure/ Public Key Infrastructure]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Our design process incorporates a risk-based approach to ensure the right amount of security is incorporated to match the risk profile for current and future PKI use cases.&amp;lt;ref name=&amp;quot;ref_cdcb6c19&amp;quot; /&amp;gt;&lt;br /&gt;
# SSS has extensive experience creating and reviewing policy artefacts required to establish a trusted PKI that are required to meet the current and future business needs.&amp;lt;ref name=&amp;quot;ref_cdcb6c19&amp;quot; /&amp;gt;&lt;br /&gt;
# Policies and procedures for the establishment of a PKI provide the certainty that the PKI has been established securely, has integrity and if necessary, can be re-built with confidence.&amp;lt;ref name=&amp;quot;ref_cdcb6c19&amp;quot; /&amp;gt;&lt;br /&gt;
# Read our whitepaper, &amp;quot;Securing Your PKI&amp;quot; for an in-depth discussion on PKIs and their management.&amp;lt;ref name=&amp;quot;ref_35143a1c&amp;quot;&amp;gt;[https://www.entrust.com/digital-security/hsm/solutions/use-case/credentialing-and-pki-applications/pki-and-digital-certificates PKI and Digital Certificates]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In creating certificates, CAs act as agents of trust in a PKI.&amp;lt;ref name=&amp;quot;ref_a4a05a47&amp;quot;&amp;gt;[https://www.entrust.com/resources/certificate-solutions/learn/what-is-pki What is PKI?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# PrimeKey uses open standards for our PKI and signing software, providing you with crypto agility.&amp;lt;ref name=&amp;quot;ref_3e57b2b7&amp;quot;&amp;gt;[https://www.primekey.com/about-primekey/public-key-infrastructure-pki/ PKI and Public Key Infrastructure technology from PrimeKey]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# With our open source PKI and signing software, you have access to the source code of the software and this protects you from unforeseen events.&amp;lt;ref name=&amp;quot;ref_3e57b2b7&amp;quot; /&amp;gt;&lt;br /&gt;
# The term public key infrastructure is derived from public key cryptography, the technology behind PKI.&amp;lt;ref name=&amp;quot;ref_9383ca55&amp;quot;&amp;gt;[https://web.uanataca.com/en/blog/digital-transformation/pki What is a PKI or public key infrastructure?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In a PKI environment, two different cryptographic keys are used for encryption and decryption purposes, known as public and private keys.&amp;lt;ref name=&amp;quot;ref_9383ca55&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI encompasses a complex set of technologies.&amp;lt;ref name=&amp;quot;ref_9383ca55&amp;quot; /&amp;gt;&lt;br /&gt;
# Do you want to get the benefits of PKI technology without having your own infrastructure?&amp;lt;ref name=&amp;quot;ref_9383ca55&amp;quot; /&amp;gt;&lt;br /&gt;
# The principles of a PKI are based on asymmetric encryption.&amp;lt;ref name=&amp;quot;ref_4d5158fc&amp;quot;&amp;gt;[https://www.bsi.bund.de/EN/Topics/ElectrIDDocuments/securPKI/securitymechanismsPKI.html Public Key Infrastructres (PKIs)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Further certificates in this PKI will be signed with the private key belonging to the root certificate.&amp;lt;ref name=&amp;quot;ref_4d5158fc&amp;quot; /&amp;gt;&lt;br /&gt;
# Not all PKI certificates must be signed with the private key of the root certificate.&amp;lt;ref name=&amp;quot;ref_4d5158fc&amp;quot; /&amp;gt;&lt;br /&gt;
# This document identifies continuing areas of concern and provides recommendations to the Internet community for additional improvements, moving toward a more robust and secure Web PKI.&amp;lt;ref name=&amp;quot;ref_b622827b&amp;quot;&amp;gt;[https://tools.ietf.org/html/draft-iab-web-pki-problems-05 Improving the Public Key Infrastructure (PKI) for the World Wide Web]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Over the years, many technical improvements have been made to the Web PKI, but several challenges remain.&amp;lt;ref name=&amp;quot;ref_b622827b&amp;quot; /&amp;gt;&lt;br /&gt;
# While in its simplest form, the Web PKI is fairly straightforward, there are a number of concepts that can complicate the relationships and the behavior.&amp;lt;ref name=&amp;quot;ref_b622827b&amp;quot; /&amp;gt;&lt;br /&gt;
# Browsers install numerous trust anchors associated with many different CAs in the Web PKI.&amp;lt;ref name=&amp;quot;ref_b622827b&amp;quot; /&amp;gt;&lt;br /&gt;
# Using a combination of private (e.g., secret) key and public key cryptography, PKI enables a number of other security services, including data confidentiality, data integrity and non-repudiation.&amp;lt;ref name=&amp;quot;ref_206e6a0d&amp;quot;&amp;gt;[https://www.fedidcard.gov/faq/what-pki-public-key-infrastructure-and-why-do-i-need-it What is PKI (Public Key Infrastructure) and why do I need it?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# As a government employee or contracted worker, you may need now, or at some time in the future, a PKI certificate to gain access to the agency information network and systems.&amp;lt;ref name=&amp;quot;ref_206e6a0d&amp;quot; /&amp;gt;&lt;br /&gt;
# Non-repudiation PKI can be used to provide non-repudiation through digital signatures.&amp;lt;ref name=&amp;quot;ref_eaff301f&amp;quot;&amp;gt;[https://docs.oracle.com/cd/B10501_01/network.920/a96582/pki.htm The Public Key Infrastructure Approach to Security]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The PKI approach to security does not take the place of all other security technologies; rather, it is an alternative means of achieving security.&amp;lt;ref name=&amp;quot;ref_eaff301f&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI allows delegated trust.&amp;lt;ref name=&amp;quot;ref_eaff301f&amp;quot; /&amp;gt;&lt;br /&gt;
# The Secure Sockets Layer (SSL) is an industry standard protocol that provides authentication, data encryption, and data integrity, in a public-key infrastructure.&amp;lt;ref name=&amp;quot;ref_eaff301f&amp;quot; /&amp;gt;&lt;br /&gt;
# From 7 December 2020, you won&amp;#039;t be able to log on to HPOS using a PKI certificate.&amp;lt;ref name=&amp;quot;ref_b998ca5b&amp;quot;&amp;gt;[https://www.servicesaustralia.gov.au/organisations/health-professionals/services/medicare/public-key-infrastructure Public Key Infrastructure]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# If your software doesn’t automatically renew your PKI certificate, we’ll send you a letter 60 days before your certificate expires.&amp;lt;ref name=&amp;quot;ref_b998ca5b&amp;quot; /&amp;gt;&lt;br /&gt;
# The Healthcare Public Directory lists individuals and organisations with active or revoked PKI certificates.&amp;lt;ref name=&amp;quot;ref_b998ca5b&amp;quot; /&amp;gt;&lt;br /&gt;
# Such a structure is known as a Public Key Infrastructure (PKI).&amp;lt;ref name=&amp;quot;ref_73b6b895&amp;quot;&amp;gt;[https://docs.intersystems.com/irislatest/csp/docbook/DocBook.UI.Page.cls?KEY=GCAS_PKIABOUT About PKI (Public Key Infrastructure)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# As a result of this, next generation business applications are becoming more reliant on Public Key Infrastructure technology to guarantee high assurance.&amp;lt;ref name=&amp;quot;ref_efe3e261&amp;quot;&amp;gt;[https://www.asiapki.org/about-pki.html Asia PKI Consortium]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Gemalto&amp;#039;s Luna is a line of hardware security module (HSM) products that generate the root key in a PKI system and keep the private key secure.&amp;lt;ref name=&amp;quot;ref_539bd397&amp;quot;&amp;gt;[https://www.pcmag.com/encyclopedia/term/pki Definition of PKI]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The foundation of a PKI is the certificate authority (CA), which issues digital certificates that authenticate the identity of organizations and individuals over a public system such as the Internet.&amp;lt;ref name=&amp;quot;ref_539bd397&amp;quot; /&amp;gt;&lt;br /&gt;
# A PKI can also be implemented by an enterprise for internal use to authenticate employees accessing the network.&amp;lt;ref name=&amp;quot;ref_539bd397&amp;quot; /&amp;gt;&lt;br /&gt;
# The PKI establishes the encryption algorithms, levels of security and distribution policy to users.&amp;lt;ref name=&amp;quot;ref_539bd397&amp;quot; /&amp;gt;&lt;br /&gt;
# Definition - What does Public Key Infrastructure (PKI) mean?&amp;lt;ref name=&amp;quot;ref_6a836360&amp;quot;&amp;gt;[https://www.techopedia.com/definition/4071/public-key-infrastructure-pki What is Public Key Infrastructure (PKI)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The Certificate Policy and PKI Disclosure Statement for the NHS Root Certificate Authority (CA) make up the complete policy under which the NHS Root CA is operated.&amp;lt;ref name=&amp;quot;ref_0a44937c&amp;quot;&amp;gt;[https://digital.nhs.uk/cyber-and-data-security/guidance-and-assurance/public-key-infrastructure-pki-documentation Public Key Infrastructure (PKI) documentation]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# If you’ve wondered what public key infrastructure (PKI) is, you’ve come to the right place.&amp;lt;ref name=&amp;quot;ref_578f7e95&amp;quot;&amp;gt;[https://sectigostore.com/blog/what-is-pki-a-laymans-guide-to-public-key-infrastructure/ What Is PKI? A Layman’s Guide to Public Key Infrastructure]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Just so we don’t undermine the complexity of PKI, let’s start with a riddle.&amp;lt;ref name=&amp;quot;ref_578f7e95&amp;quot; /&amp;gt;&lt;br /&gt;
# Think of public key infrastructure as the almighty helping hand.&amp;lt;ref name=&amp;quot;ref_578f7e95&amp;quot; /&amp;gt;&lt;br /&gt;
# PKI is the helping hand that makes online banking, paying taxes online, shopping on Amazon and so much more safe and secure!&amp;lt;ref name=&amp;quot;ref_578f7e95&amp;quot; /&amp;gt;&lt;br /&gt;
# Various companies are involved in developing PKI, with the step involving a subject verifying their own identity using a digital certificate.&amp;lt;ref name=&amp;quot;ref_8c76d2f6&amp;quot;&amp;gt;[https://www.itpro.co.uk/security/31775/what-is-public-key-infrastructure-pki What is public key infrastructure (PKI)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# This process requires the work of a registration authority (RA), which is demanded under PKI in order to verify the subject.&amp;lt;ref name=&amp;quot;ref_8c76d2f6&amp;quot; /&amp;gt;&lt;br /&gt;
# Public Key Infrastructure use features in a large range of applications, but it is most frequently used to protect digital platforms and services.&amp;lt;ref name=&amp;quot;ref_8c76d2f6&amp;quot; /&amp;gt;&lt;br /&gt;
# You may also encounter a variant of PKI when accessing e-documents and online forms that require user signatures.&amp;lt;ref name=&amp;quot;ref_8c76d2f6&amp;quot; /&amp;gt;&lt;br /&gt;
# A Public Key Infrastructure (PKI) is used to manage and distribute keys and digital certificates in publicly accessible networks to ensure secure digital communications.&amp;lt;ref name=&amp;quot;ref_78fd7484&amp;quot;&amp;gt;[https://en.ryte.com/wiki/Public_Key_Infrastructure Public Key Infrastructure]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The exchange of data, information and messages via the Internet takes place in a PKI through a key pair consisting of a public key and a private key.&amp;lt;ref name=&amp;quot;ref_78fd7484&amp;quot; /&amp;gt;&lt;br /&gt;
# The public-key infrastructure issues certificates, passes them on to the communication participants and checks the certificates for authenticity.&amp;lt;ref name=&amp;quot;ref_78fd7484&amp;quot; /&amp;gt;&lt;br /&gt;
# The standard protocol on the Internet is called PKIX (Public Key Infrastructure Exchange).&amp;lt;ref name=&amp;quot;ref_78fd7484&amp;quot; /&amp;gt;&lt;br /&gt;
===소스===&lt;br /&gt;
 &amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
</feed>