{"id":1940,"date":"2016-12-27T10:11:42","date_gmt":"2016-12-27T09:11:42","guid":{"rendered":"https:\/\/www.enigma.com.pl\/en\/?page_id=1940"},"modified":"2025-03-19T11:33:29","modified_gmt":"2025-03-19T10:33:29","slug":"public-key-infrastructure","status":"publish","type":"page","link":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/","title":{"rendered":"Public Key Infrastructure"},"content":{"rendered":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]PUBLIC KEY INFRASTRUCTURE[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]\n<p style=\"text-align: justify;\">PKI is a system of secure electronic information exchange. It ensures the integrity, confidentiality and non-repudiation of content in electronic communication. By using PKI, e-mail user for ex. has guaranteed the authenticity of the sender and the integrity of transmitted data, as well as protection against unauthorized access.<\/p>\n<p style=\"text-align: justify;\">To raise the level of information security in state institutions, local authorities, financial institutions, companies and enterprises Enigma for more than 20 years offers its own solutions to the construction and operation of PKI systems, such as:<\/p>\n[\/mk_fancy_title][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1474456941305{padding-top: 1% !important;}&#8221;][vc_column_inner width=&#8221;1\/4&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/#platform\" target=\"\" title=\"Link\"  data-id=\"mpc_button-369d19e19d22c9\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">MODUL-BASED<br \/>\nPKI<br \/>\nPLATFORM<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/#software\" target=\"\" title=\"Link\"  data-id=\"mpc_button-8069d19e19d2363\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">SOFTWARE TOOL FOR THE IMPLEMENTATION OF PKI FUNCTIONS<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/#secure-system\" target=\"\" title=\"Link\"  data-id=\"mpc_button-4569d19e19d23d1\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">SECURE<br \/>\nE-MAIL<br \/>\nSYSTEM<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<a href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/#electronic-signature\" target=\"\" title=\"Link\"  data-id=\"mpc_button-2169d19e19d2437\" class=\"mpc-button mpc-init mpc-transition mpc-animation mpc-typography--default mpc-display--block \"  data-animation-in=\"transition.perspectiveUpIn||1000||500||100\"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">QUALIFIED<br \/>\nELECTRONIC<br \/>\nSIGNATURE<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--top\"><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/mk_page_section][mk_page_section bg_color=&#8221;#ffffff&#8221; bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;80&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;platform&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]MODUL-BASED PKI PLATFORM[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\">Centaur Platform is a family of products, developed to bring organizations scalable, high technology, secure environment based on Public Key Infrastructure systems. All components of this environment were developed by Enigma SOI for more than 20 years, to implement newest cryptographic technologies and most convenient user experience on the market.<\/p>\n<p style=\"text-align: justify;\">From the individual software modules you can build systems of generation, distribution and cancellation of public keys, differing in functionality, security levels and implementation costs. CENTAUR provides support for both small customers as well as systems for hundreds of thousands of users.<br \/>\nCentaur platform runs on the most popular and highly secured equipment to store cryptographic keys of Certification Authorities and users. It allows to create any number of Certification Authorities (CA), with a complex structure and hierarchy.<\/p>\n<p style=\"text-align: justify;\">The main idea that stands behind our products is to give you products that will be as easy to use as it is possible &#8211; keeping in mind the highest security that is achievable. To do so we prepared<br \/>\nadvanced functionalities providing users all the capabilities of electronic monitoring \u2013 document and e-mail signing, encryption and decryption of data, electronic sign veri\ufb01cation etc. \u2013 with an interface as simple as possible. Users do not have to remember to recerti\ufb01cate. Users do not have to worry about data encrypted with old keys \u2013 we will provide them with it in the background. Users do not have to seek for others user key \u2013 we will prepare it for them. Desktop or mobile \u2013 you choose \u2013 we will give you solutions to use PKI on every platform you need.<\/p>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>BENEFITS<\/strong>[\/mk_fancy_title][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Protection of sensitive data confidentiality;<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">User access control for systems and applications;<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Ensuring compliance with legal requirements, including Act on the Protection of Personal Data.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_single_image image=&#8221;1232&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;appear&#8221;][\/vc_column_inner][\/vc_row_inner][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>MODULES<\/strong>[\/mk_fancy_title][vc_tabs][vc_tab title=&#8221;Centaur CCK&#8221; tab_id=&#8221;1473857226-1-35&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">Centaur CCK is the base module of the CENTAUR system. Responsible for the implementation of all key functionalities such as: con\ufb01guration and parameterization, life management of keys and certi\ufb01cates, coordinating the cooperation of all modules of the system and collection and sharing of relevant information. The user friendly (native) GUI, will allow you to de\ufb01ne distinct roles: operator, administrator, and System Security O\ufb03cer. All persons performing their tasks in the system are identified with strong authentication methods based on encryption keys and certi\ufb01cates stored on smart cards. High security is a distinctive feature of the Centaur solutions. All con\ufb01guration tasks can be performed only with the console running on the same computer on which the software is installed, which also (besides strong authentication) reduces the risks associated with unauthorized access.<\/p>\n[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Centaur PR&#8221; tab_id=&#8221;1473859711988-2-2&#8243;][vc_column_text]Centaur PR is an easy-to-use application that supports users of Registration Authority. With it, you can perform tasks, such as:<\/p>\n<ul>\n<li>register a new user,<\/li>\n<li>key generation for user,<\/li>\n<li>create user certi\ufb01cate based on: delivered public key or key generated in the Registration Authority,<\/li>\n<li>export certi\ufb01cates and CRLs,<\/li>\n<li>revocation of user certi\ufb01cate,<\/li>\n<li>process users information in batch mode,<\/li>\n<li>graphic personalization of smart cards,<\/li>\n<li>prints to support the certi\ufb01cation process (handover \/ acceptance of PIN, secure envelopes etc.),<\/li>\n<li>reports.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Centaur OCSP&#8221; tab_id=&#8221;1473859928105-2-9&#8243;][vc_column_text]Centaur OCSP is a module that allows you to verify the certi\ufb01cate status on-line via the communication protocol described in RCF 2560. The OCSP is used to provide information on the current status of a given certificate, ie. whether the certificate is valid, revoked or suspended.[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Centaur DAT&#8221; tab_id=&#8221;1474459938509-3-10&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">Centaur DAT is a module for generating timestamps con\ufb01rming the existence of a document at a time. Generating timestamps is an important safety element. The system works with real-time clock, it guarantees the correct and accurate time stamping of documents.<br \/>\nThe software performs the following tasks:<\/p>\n<ul>\n<li>acceptance of requests from users to issue a timestamp,<\/li>\n<li>veri\ufb01es demands in terms of: syntactic correctness and user permissions to receive a timestamp,<\/li>\n<li>create timestamps if the request was accepted.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Centaur SCEP&#8221; tab_id=&#8221;1474460068354-4-4&#8243;][vc_column_text]Centaur SCEP is an application that supports the certification requests from network devices which use SCEP. The application can work in automatic mode &#8211; allows for automatic or manual certi\ufb01cation device, which requires the presence of an operator.[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Centaur WWW&#8221; tab_id=&#8221;1474460178422-5-5&#8243;][vc_column_text]\n<p style=\"text-align: justify;\">Centaur WWW software is a service provided through the Internet. It allows automatic re-certi\ufb01cation (extension of the validity of the certi\ufb01cate within its validity period) of users who use smart cards.<\/p>\n[\/vc_column_text][\/vc_tab][\/vc_tabs][mk_padding_divider size=&#8221;20&#8243;][mk_fancy_title size=&#8221;20&#8243; font_family=&#8221;none&#8221;]<strong data-start=\"0\" data-end=\"32\">CENTAUR \u2013 YUBICO INTEGRATION<\/strong><\/p>\n[\/mk_fancy_title][vc_column_text css=&#8221;.vc_custom_1742380260447{margin-bottom: 0px !important;}&#8221;]\n<p data-start=\"34\" data-end=\"365\">Yubico provides hardware security tokens that support many popular protocols, such as FIDO2, PIV, and U2F. Additionally, various models of keys are equipped with the most common connectors and communication technologies on the market. These include USB-A, USB-C, Lightning, and NFC connectors for authentication on mobile devices.<\/p>\n<p data-start=\"367\" data-end=\"1102\">The Centaur software uses YubiKey tokens as carriers of cryptographic keys and certificates. For integration, Centaur software utilizes Yubico\u2019s PKCS#11 library. Centaur enables centralized management of YubiKey tokens through the Centaur PR (Registration Point) application. The operator can manage the lifecycle of tokens and certificates by generating, suspending, lifting the suspension, and invalidating certificates. Certificates generated in the Centaur PR application can be used, for example, for logging into workstations, encrypting and signing emails, and encrypting and signing documents. The software assigns a specific token to the user who uses it, allowing the operator to know which token has been issued to the user.<\/p>\n<p data-start=\"1104\" data-end=\"1324\" data-is-last-node=\"\" data-is-only-node=\"\">Support for YubiKey tokens is also available in Centaur Chiron software. This software is dedicated to the end-user, allowing them to manage their token, such as unlocking the token or renewing certificates stored on it.<\/p>\n<p>&nbsp;<\/p>\n[\/vc_column_text][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; has_top_shape_divider=&#8221;true&#8221; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;200&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;70&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;software&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]SOFTWARE TOOL FOR THE IMPLEMENTATION OF PKI FUNCTIONS[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\">PEM-HEART software is used in Public Key Infrastructure for the implementation of electronic signatures, cryptographic protection of electronic documents, including content via e-mail and the data on the disks. It could be used with certi\ufb01cates issued by standard or quali\ufb01ed Certi\ufb01cation Authorities. PEM-HEART o\ufb00ers a standard set of functions for securing messages using cryptography, by supporting protection of message integrity, authentication, non-repudiation of origin of the author and confidentiality. It also verifies the signatures issued by qualified Certi\ufb01cation Authorities.<\/p>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>BENEFITS<\/strong>[\/mk_fancy_title][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Modern, safe and convenient way to sign documents (electronic \ufb01les)<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li>Confirmation of the credibility of the sender (Identity-based cryptography)<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li>Guarantee data integrity and con\ufb01dentiality<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li>Easy veri\ufb01cation of the changes in signed documents<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][\/vc_column_inner][\/vc_row_inner][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>MODULES<\/strong>[\/mk_fancy_title][vc_tabs][vc_tab title=&#8221;PEM-HEART Aplet&#8221; tab_id=&#8221;1473857226-1-35&#8243;][vc_column_text]Accessible through the Web and designed for the remote exchange of keys and certi\ufb01cates located on cryptographic cards PKCS#11 and in the \ufb01les PKCS#12 (* .pfx, * p12). It is widely used to integrate with web systems that consumes PKI services.[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;PEM-HEART API&#8221; tab_id=&#8221;1474461760390-1-3&#8243;][vc_column_text]O\ufb00ers high-level functions of secure message (lock\/unlock message), allowing very easy enable security mechanisms for any application created by the developers team. It is used to give developers all the PKI features with simple programming interface to integrate it within their products.[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;PEM-HEART GUI&#8221; tab_id=&#8221;1474462030063-2-10&#8243;][vc_column_text]Clients software for data encryption, signing and veri\ufb01cation of quali\ufb01ed electronic signatures for all electronic documents &#8211; works on Windows family system, Linux and MacOS. It integrates with the system to provide users with an easy way to use all the PKI possibilities.[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;Encard Virtual&#8221; tab_id=&#8221;1474462243235-3-8&#8243;][vc_column_text]A simple way to solve the problem of lost keys \u2013 in cooperation with Centaur CCK key archive. When the user needs to use one of his previous keys (to read e-mails encrypted with key that was lost in the past) our software will communicate to the archive, authenticate with current key and download the old private key \u2013 without any interaction with the user \u2013 everything in the background to provide user with information he needs.[\/vc_column_text][\/vc_tab][\/vc_tabs][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; has_top_shape_divider=&#8221;true&#8221; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;200&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;70&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;secure-system&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]SECURE E-MAIL SYSTEM[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\">KryptoMail secure e-mail system is a modular software suite that protects the con\ufb01dentiality and authenticity of the information transmitted in the electronic e-mail system, which uses strong cryptography. Electronic signature usage ensures the integrity and authenticity of all information, as well as the unambiguously veri\ufb01cation of the sender identity. Only the sender and included recipients can read the message. E-mail protection is implemented in a way that does not require changing the habits of the user. Depending on the level of security, secures the system using password or microprocessor card. The system works with both desktop computers and mobile devices (including smartphones), and can be implemented in all organizations regardless of size.<\/p>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>BENEFITS<\/strong>[\/mk_fancy_title][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Con\ufb01rmation of the authenticity of the sender and the recipient in electronic correspondence<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Quick and secure way to transfer important information<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Protection against unauthorized reading and usage<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Protection against electronic attacks and spam<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_single_image image=&#8221;955&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;appear&#8221;][\/vc_column_inner][\/vc_row_inner][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>MODULES<\/strong>[\/mk_fancy_title][vc_tabs][vc_tab title=&#8221;KryptoMail-C&#8221; tab_id=&#8221;1473857226-1-35&#8243;][vc_column_text]Software for the end-users, used to encrypt and sign e-mails.<\/p>\n<p>Moreover:<\/p>\n<ul>\n<li>cooperates with email archive and keys archive,<\/li>\n<li>supports all popular protocols, including SMTP, POP3 and IMAP (with the secure connections protected via SSLv3\/TLS protocol),<\/li>\n<li>allows de\ufb01nition of address books stored in the LDAP,<\/li>\n<li>enables default sign and encryption of all electronic correspondence,<\/li>\n<li>has advanced filters to search information, including virtual folders and tags,<\/li>\n<li>smart protection against spam and phishing.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;KryptoMail Serwer&#8221; tab_id=&#8221;1474461760390-1-3&#8243;][vc_column_text]Mail servers software.<br \/>\nAllows:<\/p>\n<ul>\n<li>building complete mail server,<\/li>\n<li>user information is stored in LDAP repository (assigned to user aliases, mailbox size limits),<\/li>\n<li>uses strong authentication of users,<\/li>\n<li>based on certi\ufb01cate (rather than the most commonly used pairs username:password),<\/li>\n<li>allows the user to set automatic responses (autoresponders) at a time when the user is outside of the o\ufb03ce,<\/li>\n<li>works with any client programs supporting SMTP, POP3 or IMAP.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tab][vc_tab title=&#8221;KryptoMail-Arch&#8221; tab_id=&#8221;1474462030063-2-10&#8243;][vc_column_text]Software allowing to build e-mail archive system:<\/p>\n<ul>\n<li>handles plain and con\ufb01dential e-mails,<\/li>\n<li>allows building e-mail archive system,<\/li>\n<li>creates an index of the messages and lets them search based on: the sender, recipient, subject or date,<\/li>\n<li>all messages sent to the server go automatically to the archive,<\/li>\n<li>information on the identity of the sender, using electronic signatures with the messages are also gathered,<\/li>\n<li>ensures constancy and integrity of each stored message.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_tab][\/vc_tabs][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; has_top_shape_divider=&#8221;true&#8221; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;200&#8243;][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center top&#8221; bg_repeat=&#8221;repeat-x&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;1.3&#8243; video_opacity=&#8221;0.3&#8243; padding_top=&#8221;70&#8243; top_shape_style=&#8221;jagged-rounded-top&#8221; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_color=&#8221;#ffffff&#8221; section_id=&#8221;electronic-signature&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][mk_padding_divider size=&#8221;50&#8243;][mk_fancy_title size=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]QUALIFIED ELECTRONIC SIGNATURE[\/mk_fancy_title][mk_padding_divider][vc_column_text]\n<p style=\"text-align: justify;\">A tool for the implementation of the advanced features of a secure electronic signature in the Public Key Infrastructure is PEM-HEART Siganture software.<br \/>\nThe software allows the submission and verification of electronic signatures for qualified certification centers. PEM-HEART offers a standard set of cryptographic services to protect messages, ie. Protecting the integrity of the message&#8217;s authentication and non-repudiation of origin provided through a secure electronic signature and confidentiality. Verifies the signatures issued by all the qualified certification centers.<\/p>\n[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][mk_fancy_title size=&#8221;20&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]<strong>BENEFITS<\/strong>[\/mk_fancy_title][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Modern, safe and convenient way to sign documents (electronic files)<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Sender statement of assurance (identification)<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Guarantee of data integrity and confidentiality<\/li>\n<\/ul>\n[\/vc_column_text][vc_column_text]\n<ul>\n<li style=\"text-align: left;\">Easy verification of the changes in signed documents<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_single_image image=&#8221;957&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;appear&#8221;][\/vc_column_inner][\/vc_row_inner][mk_padding_divider size=&#8221;20&#8243;][\/vc_column][\/mk_page_section]\n","protected":false},"excerpt":{"rendered":"<p>[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]PUBLIC KEY INFRASTRUCTURE[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] PKI is a system of secure electronic<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1938,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Public Key Infrastructure - Enigma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Public Key Infrastructure - Enigma\" \/>\n<meta property=\"og:description\" content=\"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]PUBLIC KEY INFRASTRUCTURE[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] PKI is a system of secure electronic\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Enigma\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T10:33:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/\",\"name\":\"Public Key Infrastructure - Enigma\",\"isPartOf\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\"},\"datePublished\":\"2016-12-27T09:11:42+00:00\",\"dateModified\":\"2025-03-19T10:33:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and solutions\",\"item\":\"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Public Key Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.enigma.com.pl\/en\/#website\",\"url\":\"https:\/\/www.enigma.com.pl\/en\/\",\"name\":\"Enigma\",\"description\":\"Information Security Systems\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Public Key Infrastructure - Enigma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Public Key Infrastructure - Enigma","og_description":"[mk_page_section bg_image=&#8221;https:\/\/www.enigma.com.pl\/wp-content\/uploads\/2016\/09\/header-enigma-products-2-1.jpg&#8221; bg_position=&#8221;center bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; enable_3d=&#8221;true&#8221; speed_factor=&#8221;0.6&#8243; min_height=&#8221;250&#8243; padding_top=&#8221;0&#8243; padding_bottom=&#8221;0&#8243; top_shape_color=&#8221;#ffffff&#8221; has_bottom_shape_divider=&#8221;true&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][\/vc_column][\/mk_page_section][mk_page_section bg_position=&#8221;center center&#8221; bg_repeat=&#8221;no-repeat&#8221; bg_stretch=&#8221;true&#8221; padding_top=&#8221;40&#8243; padding_bottom=&#8221;70&#8243; top_shape_color=&#8221;#ffffff&#8221; bottom_shape_style=&#8221;folded-bottom&#8221; bottom_shape_size=&#8221;small&#8221; bottom_shape_color=&#8221;#ffffff&#8221; sidebar=&#8221;sidebar-1&#8243;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;50&#8243; force_font_size=&#8221;true&#8221; size_smallscreen=&#8221;30&#8243; size_tablet=&#8221;30&#8243; size_phone=&#8221;30&#8243; font_weight=&#8221;bold&#8221; txt_transform=&#8221;uppercase&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;10&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;]PUBLIC KEY INFRASTRUCTURE[\/mk_fancy_title][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][mk_fancy_title size=&#8221;16&#8243; txt_transform=&#8221;none&#8221; letter_spacing=&#8221;2&#8243; margin_top=&#8221;20&#8243; margin_bottom=&#8221;10&#8243; font_family=&#8221;none&#8221;] PKI is a system of secure electronic","og_url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/","og_site_name":"Enigma","article_modified_time":"2025-03-19T10:33:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/","url":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/","name":"Public Key Infrastructure - Enigma","isPartOf":{"@id":"https:\/\/www.enigma.com.pl\/en\/#website"},"datePublished":"2016-12-27T09:11:42+00:00","dateModified":"2025-03-19T10:33:29+00:00","breadcrumb":{"@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/public-key-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.enigma.com.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Products and solutions","item":"https:\/\/www.enigma.com.pl\/en\/products-and-solutions\/"},{"@type":"ListItem","position":3,"name":"Public Key Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.enigma.com.pl\/en\/#website","url":"https:\/\/www.enigma.com.pl\/en\/","name":"Enigma","description":"Information Security Systems","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.enigma.com.pl\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/1940"}],"collection":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/comments?post=1940"}],"version-history":[{"count":11,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/1940\/revisions"}],"predecessor-version":[{"id":8290,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/1940\/revisions\/8290"}],"up":[{"embeddable":true,"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/pages\/1938"}],"wp:attachment":[{"href":"https:\/\/www.enigma.com.pl\/en\/wp-json\/wp\/v2\/media?parent=1940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}