7 - Application |
Provides identity verification (TLS client/server certs, email signing with S/MIME, code signing). Applications rely on CAs for trust. |
Provides identity & trust via Web-of-Trust (WoT), enabling signed credentials, certificates, and cross-verification. Focused on non-repudiation of cryptographic commitments anchored (e.g., Arweave). |
6 – Presentation |
Supports secure data formats: certificates in ASN.1/DER/PEM. Ensures integrity and authenticity of exchanged keys. |
Uses SPKI formats (simpler, JSON-like, more human-readable) for certificates. Security logic focuses on binding keys to identities without ASN.1 complexity. By design, private keys are handled in a way that reduces exposure to memory disclosure attacks (e.g., through mutable types). |
5 – Session |
Enables session security establishment (e.g., SSL/TLS handshake) by authenticating server (and optionally client). PKI ensures session peers are who they claim to be. |
Could support session initialization by verifying cryptographic commitments before session establishment. SPKI WoT allows distributed trust validation before sessions. |
4 – Transport |
Indirectly secures transport protocols (e.g., TLS over TCP). PKI ensures the endpoints exchanging transport data are trusted. |
Same effect, but with decentralized trust anchoring. Instead of a global CA chain, trust is validated through mutual signatures and WoT relations. |
3 – Network |
PKI doesn’t directly operate here but secures IPsec VPNs (via IKE certificates). Ensures network peers are authenticated. |
SPKI doesn't cover on VPN operations on network devices. However, implementing custom IPSec on software level for VPN is possible. |
2 – Data Link |
Rare. PKI can be used in 802.1X (EAP-TLS) for Wi-Fi/Ethernet authentication. |
Similar to OSI Layer 3, SPKI does not natively handle data link authentication but could be implemented in custom firmware if needed. |
1 – Physical |
PKI doesn’t reach here; assumes secure hardware/HSM for key storage particularly for existing public CAs while secure, though costly. |
SPKI includes software-emulated HSM (SHSM), giving it slight overlap with physical layer concerns (secure key handling & zero-trust enforcement). |
Summary |
Primarily focuses on OSI Layers 3–7, with optional Layer 2 support via 802.1X. |
Primarily focuses on OSI Layers 4–7, with optional software-level support extending toward the physical layer via SHSM. |