Get in contact with us
To keep any sensitive data secure, PKI and digital signatures are necessary technologies at the very heart of your IT systems. PrimeKey offers high-quality software for securing anything from an entire organization and cloud to mobile or IoT systems.
The PrimeKey Hardware Appliance solution is the most efficient and easy way to implement your PKI or digital signing solution. And the SEE is the very first FIPS-protected application server for any critical application and data. Our hardware solutions help protect your IT solutions and entire organization from fraud, counterfeit, piracy and interception.
PrimeKey’s EJBCA and SignServer are available in the Cloud. It’s easy to get started and you only pay for the resources you use.
PrimeKey’s technology is used by organizations and enterprises to securely implement PKI solutions used for ePassports, eBanking, ePayment, mobile/Internet security, IoT, IIoT and more.
IIoT stands for Industrial Internet of Things.
NPKD stands for National Public Key Directory.
HTTPS stands for Hypertext Transfer Protocol Secure.
HTTPS is an extension of HTTP and is used for secure communication over a digital network, most often the Internet.
SSL stands for Secure Sockets Layer.
TLS stands for Transport Layer Security.
MRTD stands for Machine Readable Travel Document.
PKCS stands for Public Key Cryptography Standards.
CSR stands for Certificate Signing Request.
CRL stands for Certificate Revocation List.
VA stands for Validation Authority.
RA stands for Registration Authority.
CA is short for Certificate Authority.
PKI stands for Public Key Infrastructure.
A digital certificate is a digitally signed document and can be compared with the physical identity card or a passport in the analog world. A digital certificate is used to provide and prove the identity of a user, server or thing when communicating over untrusted networks.
X.509 is a PKI standard for digital certificates and public key certificates. It verifies that a public key belongs to a specific user, server or other digital entity.
A Validation Authority (VA) is a provider of certificate validation services. Certificate validation services can include access to Certificate Revocation Lists (CRL), Online Certificate Status Protocol (OCSP) and CA chain certificate downloads.
A Certificate Authority is responsible for feeding the Validation Authority with certificate status updates based on the defined policy.
A Certificate Authority manages the certificate lifecycles for people, servers or things. A Certificate Authority (CA) issues, renews, manages and revokes digital certificates.
A CA signs certificates with its private key and is the trust anchor for the issued certificates. The Certificate Authority private key is normally stored in a Hardware Security Model (HSM).
A Certificate Authority usually operates in hierarchies where a Root CA certifies itself (self signed) and a subordinate CA is certified (signed) by a superior CA. Most Certificate Authority software solutions work with standard interfaces and protocols so that interoperability can be guaranteed.
A Certificate Authority works together with a Registration Authority where the RA issues a certificate request to the CA via a user-friendly GUI or via integration friendly APIs and standard protocols.
PrimeKey offers an industry-first solution, Identity Authority Manager, for implementing an RA directly into a smart manufacturing environment.
The Network and Information Systems (NIS) directive is an initiative developed to protect the economy of the European Union from major cyberthreats.
The NIS Directive was adopted by the European Parliament on July 6th, 2016, and entered into force in August 2016. Member states had to transpose the directive into their national laws by May 9th, 2018 and identify operators of essential services by November 9th 2018.
For organizations to meet the obligations of NIS, the task can be separated into administrative and technical measures. Administrative measures are implemented through the accordance of security standards like ISO/IEC 27001 Information Security Management System (ISMS). These are supported by administrative actions and risk management measures including ongoing user training, security audits and ethical hacking to ensure security competency and to improve organization’s level of cyber readiness from both business and regulatory perspectives.
Technical solutions include the implementation and continuous development of cyber situational awareness solutions such as SIEM (Security Incident and Event Management), secure identity confirmation tools, and data communications security solutions. Only a combination of administrative and technical measures is enough to comply with the NIS authoritative requirements.
PKI & code signing help meet NIS compliance
To meet the fundamental requirement under NIS for “appropriately authenticated and authorized” access, organizations need a method of defining and enacting controls that is both secure and can be deployed across disparate infrastructure and processes.
Public Key Infrastructure (PKI) is the most widely adopted form of technology for establishing the identity of people, devices, and services – enabling controlled access to systems and resources, protection of data, and accountability in transactions. PKI includes a set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and public keys.
Certificates are issued to entities such as users, devices, web servers, passports, smartcards and IoT devices. The provisioning of certificates to either devices or tokens enables two benefits. Firstly, it gives a device or a token an identity, and secondly, it provides the means to setup a secure encrypted communication channel. PKI and certificates deliver a method as required by the NIS directive to identify, trust and securely communicate with any entity throughout an entire organization, partners, and customers.
PKI also underpins technologies, such as digital signatures and encryption for use cases as diverse as e-commerce and the growing Internet of Things (IoT). Digital signatures can secure additional activities, such as signing PDFs, code or other information assets, to ensure the origin of the document/code or to ensure that a transaction was in place at a certain time. Digital Signatures can allow an organization to track who exactly performed the signature and at what time.
To learn more, download our white paper:
PrimeKey’s take on the NIS Directive
The directive on security of Network and Information Systems (NIS) ensures member states are prepared, and provides legal measures to boost the overall level of cybersecurity in the EU. NIS requires member states to be appropriately equipped in several ways, including Computer Security Incident Response Teams (CSIRT) and a competent national NIS authority.
Businesses that are identified as Operators of Essential Services (OES) have to take appropriate security measures and notify serious incidents to relevant national authority. Key digital service providers including search engines, cloud computing services and online marketplaces also have to comply with the security and notification requirements under the NIS directive.
Code signing is a digital signature that ensures that software on devices and computers is trusted and unmodified. Code signing is used to sign scripts and executables – it confirms the software author and guarantees the code has not been altered since it was signed.
Code signing and code signing software are most commonly used to provide security when deploying software, such as installing and updating applications on your computer, smart phone, tablet or home appliances.
When building new solutions for IoT, it is important that you can trust each component in the solution from the cradle all the way to when it is being revoked or discontinued. This process begins with establishing one or several secure identities within each IoT component.
A digital birth certificate starts the trust chain and can be leveraged during the lifecycle of the component to enable secure automatic on-boarding – when changing the owner of the component or when a factory reset is required.
A Registration Authority (RA) is a function for certificate enrollment used in Public Key Infrastructures. It is responsible for receiving certificate signing requests – for the initial enrollment or renewals – from people, servers, things or other applications. The Registration Authority verifies and forwards these requests to a Certificate Authority (CA).
A Registration Authority is also responsible for receiving other certificate lifecycle management functions. For example, revocation. The RA implements business logic to accept requests, including methods for verifying the origin of the requester and the party that should have the certificate.
A Registration Authority is usually separated from the Certificate Authority for accessibility and security reasons. The RA is accessed via a user-friendly GUI or via integration friendly APIs and standard protocols.
A PKI certificate is a digitally signed document that can be comparable with a physical identity card or a passport used in the analog world. A PKI certificate is a trusted digital identity. It is used to identify and authenticate users, servers or things when communicating over untrusted networks. A PKI certificate is also called a digital certificate.
PKI certificates use private and public key encryption, where the public key is stored in the certificate together with information about the owner and some administrative data. The certificate is signed by the issuing CA and the signature is attached in the certificate. X.509 is the standard for the most commonly used digital certificate formats.
The purpose of PKI certificates is to create a secure digital world where each certificate works as gatekeeper for secure sharing of digital information.
Different types of PKI and digital certificates include:
PKI is about building a framework to issue trusted digital identities to users, servers or things. The PKI framework is governed by a set of policies and procedures that defines level of security. PKI stands for Public Key Infrastructure.
A PKI typically includes a combination of software and hardware components, and together they implement functions for Certificate Authorities, Registration Authorities and Validation Authorities. These, in turn, are then responsible for issuing and lifecycle manage trusted identities for users, servers and things.
In everyday life, you use PKI when doing things online such as:
How can we help?