Building PKI and Certification Authorities Diana Kučerová 28. 1. 2025

PKI and Certificate Authorities

Solution Design Full Implementation Current State Audit
obor-proid-domain-2

Modern PKI and CA

Crypto-agile infrastructure without compromise

PKI (Public Key Infrastructure) is a technology for secure management of digital certificates and encryption keys. It forms the foundation for trusted communication, user and device authentication, data encryption, and electronic document signing.

A strong and secure PKI infrastructure is essential to today’s digital world. With our solutions, you gain full control over your digital identity and ensure maximum protection of your data and communications.

Turnkey Solutions

We build domain PKIs including operational, contingency, and security documentation.

Scalable Architecture

We deploy certification authorities designed for future expansion and the integration of additional modules.

Security

Physical protection of deployed servers as well as secure data storage in HSMs (Hardware Security Modules).

modern-workforce-security-proid-orez-01

Deploying a modern domain PKI brings key advantages:

Maximum security

Encrypted communication, digital signatures, secure digitalization, and strong data protection across your organization.

Automation and Time Savings

Simplified certificate management through automated processes.

Crypto-agility

Our solutions allow rapid adaptation to new algorithms, standards, or threats. This includes authority reconfiguration, migration to newer algorithms, or readiness for post-quantum cryptography.

We specialize in building multi-layered certification authority infrastructures
Icon
Modern Cryptography

We implement the latest standards in encryption and authentication (x509, post-quantum cryptography, elliptic curves)

Icon
HSM Key Protection

Top-level protection for private keys using hardware security modules

Icon
Certificate Management

Simple and efficient certificate lifecycle management with automation

Icon
Comprehensive Approach

From analysis and design to implementation and support, we tailor solutions to your specific needs

Comprehensive Solutions

Certification Authorities and PKI for Every Organization

Whether you’re a bank, a healthcare provider, or a tech company, a robust PKI is essential for data protection, secure authentication of users and devices, and digital document signing. Our solutions provide high-level security and seamless integration into your existing systems.

konference-ostrava-01

Public Key Systems

  • Authentication
  • Smartcard Logon (two-factor authentication)
  • Electronic Signature and Non-repudiation
  • Electronic Seal
  • Data Encryption and Protection (EFS, S/MIME, HTTPS,…)
  • Design of Certification Authority Hierarchies

  • Role and Permission Management

  • Active Directory Certificate Services (PKI based on Microsoft Windows Server)

  • Key Archiving and Recovery

  • OCSP, NDES, CDP, AIA

  • Online CA Backup (SQL Database)

  • Key Protection in HSM

  • Device Certificates for Mobile Platforms, IoT, and Automated Industrial Machinery

  • Automated Certification Authorities

  • Custom Algorithms and Policies

  • Cryptographic Accelerators and Hardware Devices

  • Basic Constraints, Name Constraints

  • X.509, PKCS#10, PKCS#7/CMS, S/MIME, PKCS#12, CRL
  • RSA, EC (Elliptic curves)
  • SHA-2, SHA-1
  • OCSP, NDES/SCEP, Kerberos, Timestamp (RFC 3161)
  • HSM / Smart cards

  • PKCS#11 (Cryptoki)

  • Minidriver (Smart Card Minidriver Specification)

  • TokenD

  • Card management / PIN management

  • Smart card readers: CCID, PC/SC, Secure PIN Entry

  • Authentication
  • Smartcard Logon (two-factor authentication)
  • Electronic Signature and Non-repudiation
  • Electronic Seal
  • Data Encryption and Protection (EFS, S/MIME, HTTPS,…)
  • Design of Certification Authority Hierarchies

  • Role and Permission Management

  • Active Directory Certificate Services (PKI based on Microsoft Windows Server)

  • Key Archiving and Recovery

  • OCSP, NDES, CDP, AIA

  • Online CA Backup (SQL Database)

  • Key Protection in HSM

  • Device Certificates for Mobile Platforms, IoT, and Automated Industrial Machinery

  • Automated Certification Authorities

  • Custom Algorithms and Policies

  • Cryptographic Accelerators and Hardware Devices

  • Basic Constraints, Name Constraints

  • X.509, PKCS#10, PKCS#7/CMS, S/MIME, PKCS#12, CRL
  • RSA, EC (Elliptic curves)
  • SHA-2, SHA-1
  • OCSP, NDES/SCEP, Kerberos, Timestamp (RFC 3161)
  • HSM / Smart cards

  • PKCS#11 (Cryptoki)

  • Minidriver (Smart Card Minidriver Specification)

  • TokenD

  • Card management / PIN management

  • Smart card readers: CCID, PC/SC, Secure PIN Entry

Contact us to discover how we can enhance your organization’s security.
Scroll to Top