{"componentChunkName":"component---src-templates-blog-post-js","path":"/blog/using-pki-to-secure-plug-and-charge/","result":{"data":{"site":{"siteMetadata":{"title":"No Frills News"}},"contentfulNfnPost":{"postTitle":"Using PKI to secure plug and charge","slug":"using-pki-to-secure-plug-and-charge","createdLocal":"2021-05-22 14:31:05.759994","publishDate":"2021-05-21 21:24:23+00:00","feedName":"Connected Car","sourceUrl":{"sourceUrl":"https://securityboulevard.com/2021/05/using-pki-to-secure-plug-and-charge/"},"postSummary":{"childMarkdownRemark":{"html":"<p>The post Using PKI to secure plug and charge appeared first on Intertrust Technologies.\nPlug and charge security risksThere are a number of threats posed by charging stations and their interaction with EVs that plug and charge security need to address.\nThe underlying security protocols of plug and charge limit these threats by using asymmetric cryptography using a public key infrastructure (PKI).\nHow PKI for plug and charge worksThe essential mechanisms for plug and charge security are achieved through a combination of symmetric cryptographic algorithms and asymmetric cryptographic algorithms using a PKI.\nCertificate authorities (CAs) play a significant role in the function of the plug and charge security PKI.</p>"}}}},"pageContext":{"slug":"using-pki-to-secure-plug-and-charge"}}}