Ramblings on IT and Security

Tag: PKI

PKI – Part 4: Understanding Cryptographic Providers

Introduction

In the realm of Public Key Infrastructure (PKI), where the keys to digital security are exchanged, stored, and safeguarded, cryptographic providers play a pivotal role. These providers are the guardians of cryptographic keys, ensuring the integrity, confidentiality, and authenticity of digital communications. They are the invisible sentinels that underpin the very foundation of trust in the digital world.

Continue reading

PKI – Part 3: The role of hash functions in PKI

With Public Key Infrastructure (PKI), cryptographic hash functions play a pivotal, yet often understated role, operating ceaselessly to secure the integrity and authenticity of digital data as it navigates through contemporary communication networks. To appreciate fully the indispensable role they occupy in PKI, it is essential first to delineate the fundamental principles of hash functions and to understand why they are frequently analogized as the digital fingerprints within the cybersphere.

Continue reading

PKI – Part 2: Choosing the key length and algorithm

As I advance into the heart of PKI in this second installment, the focal point shifts towards two pivotal decisions that anyone involved in setting up a PKI must grapple with — choosing the appropriate key length and the cryptographic algorithm. These choices are far from arbitrary, for they are the bedrock of a secure and efficient PKI. A meticulous selection in this stage ensures a fortification capable of withstanding the numerous cyber threats that litter the digital space in this day and age.

Continue reading

© 2025 Michael Waterman

Theme by Anders NorenUp ↑