Want to create interactive content? It’s easy in Genially!

Get started free

Digital Technology Presentation

Anish Shrestha

Created on November 29, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

Public Key Infrastructure (PKI) using OpenSSL

PRESENTED BY:Anish Shrestha (3153193) Ayon Mazumder (3162394) Vignanvardhan Jangan (3167508)

INDEX

Text + image

Quote

Section

Relevant data

Timeline

Graphic + text

Table + text

List / process

Video

Text + icons

Audio

Embedded content

Interactive question

Conclusions

Closure

Contextualize Your Topic with a Subtitle

PKI using OpenSSL

RECALL

Digital Security and CertificatesSecure Communication and Authentication Asymmetric Cryptographic Public Keys OpenSSL is an open-source library.

PKI Components

RECALL

Public and Private KeysDigital Certificates Certificate Authorities (CAs) Registration Authorities (RAs) Certificate Database Key Management

Contextualize Your Topic with a Subtitle

PKI USING OPENSSL DEMO

Let's get started

  • mkdir PKI, demoCA, newcerts
  • We created PKI as the main folder.
  • We created demoCA to store everything that is inside PKI.
  • We created newcerts to store the new digital certificate.
  • We created two files they are:
  • index.txt and serial
  • index.txt is a database index file.
  • serial is the current serial number.
  • cp "/usr/lib/ssl/openssl.cnf" "home/stoner99999/Desktop/PKI/"
This command is to copy the configuration file to our PKI folder.

COMMANDS USED

  • The above command ca.key was used to create the private key and ca.crt was used to create a public key.
  • As you can see it asked us to "Enter PEM pass phrase" for the private key which we cannot see.
  • For the public key, we filled out our information such as country name, state, city, organizations etc.
  • openssl req -new -x509 -keyout ca.key -out ca.crt
-config openssl.cnf

COMMANDS USED

  • openssl genra -aes128 -out server.key 1024
This command is to generate public and private key pairs and we saved it on the server.key file where -aes128 is the encryption method.
  • openssl rsa -in server.key -text
Since the server.key is an encrypted file, to view this content we used the above command.

COMMANDS USED

  • openssl req -new -key server.key -out server.csr
-config openssl.cnf This command is used to generate a certificate signing request when a company has a keyfile which is server.key it should generate a certificate signing request. Just so you know, we used the same command with -x509 option. So, the difference is without -x509 it generates a signing request and with -x509 it generates a self-signed certificate.

COMMANDS USED

  • openssl ca -in server.csr -out server.crt -cert ca.crt -keyfile ca.key -config openssl.cnf
The above command is used for generating certificates where CA's signed on the certificate. Just so you know, In the real world there is a trusted certificate authority since we do not have access to that, We created a self-signed certificate as a CA which is used in the above command as "ca.key".

COMMANDS USED

  • Need to expalin

COMMANDS USED

PRESENTATION