Interactive PKI Tutorial
Private and Public Keys
Public key cryptography uses a pair of mathematically related keys. The private key must be kept secret, while the public key can be shared freely.
Private Key
Used to:
- Sign data (creates digital signatures)
- Decrypt data encrypted with the public key
⚠️ Must be kept secret and protected!
Public Key
Used to:
- Verify signatures created by the private key
- Encrypt data (only the private key can decrypt it)
✓ Safe to share publicly
Example: End Entity Key Pair
Private Key
-----BEGIN PRIVATE KEY----- MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCrUGhyAUwd3jWr 1YLHvuS2kKFVWMk7Xezoicx8RD2v/NoBXt7kaJcgUoUuq/5U+ASgj6yGWyl6Cnlw oVVfaY3H7tTLs9Qj+HWpm6BOH1TFz0ooDXjiNaHB1ceai40QQI1jMxe/pih9wYvV MYNXohgTyK5sc+AngVdXZqz/rj59IlgeVal873ReEZyHEUUDNkoBSy2DrRXv/Vfk 6ouVm1d+1c114Sk6apkkJ60uGlMC7DTWyowkoqBsrDYFbFCoWpb4Ef3Tk2V5DpCQ 3D8IJWV/1llj3gaPqib790njxixaZ+wHZWJ3QjR4LUeIIcyHroty9veIOX8rCI0c xXzY/iHzAgMBAAECggEADn4H+YD9/fBy4Bb48DBIOK0fVARMF09L5j4ZN0THzSmZ 2nZt0USLaFevkZh8mvzvDOAqnnEVOKnf+egdonhgK9MBKG+NjJkNTYXvUTyNFz2a dROMSUkNM12EFbq+Rur9d8nDAnQqRiOUUm3Uweb7nEAK7vzJSfF2QI9C8+kH7ndQ xlkkCWTIw9m9IXQmF9rr498wJDkkcmEIO4lCDAwX0PodP1PsI3iAIvqJbpc17o6g jBSQXU7FHp77F2ct1nFtjmPfuMHxLfL++i/O62LRisLfLcS0jCi/pkaxWzHim1g9 +6JrvTa7XR5UKU00lkCiUvc8nBevV1iyc4H3rLczMQKBgQDVshx4HU8tF3spRZ0Y +6yg6Ddt3pBNhhh1pvW4roRF90wGiUFkZ3pz56ahGuMyilQ5J3Arfaw1/zkeKHYD 5U0uU+kQ9FYK4SBpP9NgPf6zkvBVz2X3J005t7IyAQOtqQncHVG6cKpvBrY1mB+C gv0p16B4CYRvu92JneCBpu0J8QKBgQDNOm/DcCDN7icaqzug1rTvEUwxTNSugPWm QdvMMqPgeWqZMe86jEnGnEXQKCYyre/rRPNzcAWOKbcTj3L688hc7P7JBSfio9Eh mKJ1Phv1PsMLLIZSrpYg1rCF50YVvpNuIaAZd6iomGHGZeoNYzn3+MVHMmARkho4 R0HQDNwmIwKBgQDKbhjt58XTD0VKSXmR6wcSvieT2puT9I1DFk/7DMaciLDqGCdr 92JWXYDJaHEEtWknYyas7DWwSP9QhD+XXSYJ1s8Xkn3XfH95dE7GArQ+Y9lrUDZl NEPBgzQ4jiFv5otCijubg5LP7em5R0vCFFfBxVNroohkV/B6pqW/6+Lr4QKBgDMh hAblQMcNtqBmWQzRcXK+lIUT50kyyAEMF37gfwPGPFC+qCOmIBtjg+FAn4Ow4j1z iFQSbM/mhL5S1wq/AgRk53Wd2zoUJl6AcLlVKBIJ+P4nsa+X379+vawe2s9AE+s0 ZXby4QpgLLwJWC7Nsfud90itvFGkXPP4jOUQzyiRAoGAXLfJRK2re7oKmZ8V5PjW dloEaE2CJOaxdX2/hla/4XLNIaw4h992EdBdZsCvNZbR/em20YmCQbI45xAsPNAW TKcQ3ICOTT6gMLgPZi7l/j2zxziStTrhgWRHPn7n8YEGZ59Mf1U8B/1Zm/AuCB+Z 4WU/hll/bjROwvzOpL/RtIM= -----END PRIVATE KEY-----
⚠️ This private key is shown unencrypted for educational purposes only. In production, private keys are always stored securely.
Public Key
-----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAq1BocgFMHd41q9WCx77k tpChVVjJO13s6InMfEQ9r/zaAV7e5GiXIFKFLqv+VPgEoI+shlspegp5cKFVX2mN x+7Uy7PUI/h1qZugTh9Uxc9KKA144jWhwdXHmouNEECNYzMXv6YofcGL1TGDV6IY E8iubHPgJ4FXV2as/64+fSJYHlWpfO90XhGchxFFAzZKAUstg60V7/1X5OqLlZtX ftXNdeEpOmqZJCetLhpTAuw01sqMJKKgbKw2BWxQqFqW+BH905NleQ6QkNw/CCVl f9ZZY94Gj6om+/dJ48YsWmfsB2Vid0I0eC1HiCHMh66Lcvb3iDl/KwiNHMV82P4h 8wIDAQAB -----END PUBLIC KEY-----
✓ This public key can be safely shared and will be embedded in the certificate.
Key Concept: These keys are mathematically related. The public key (shown above) will be embedded in the certificate (Chapter 2), allowing others to verify signatures created with the private key and encrypt data that only the private key can decrypt.