{"id":5639,"date":"2025-01-08T09:36:22","date_gmt":"2025-01-08T09:36:22","guid":{"rendered":"https:\/\/bmsicl.in\/?p=5639"},"modified":"2025-01-08T09:36:22","modified_gmt":"2025-01-08T09:36:22","slug":"pki-public-key-infrastructure-in-hindi","status":"publish","type":"post","link":"https:\/\/www.reilsolar.com\/library\/pki-public-key-infrastructure-in-hindi\/","title":{"rendered":"PKI in Hindi,(Public Key Infrastructure) PKI \u0915\u094d\u092f\u093e \u0939\u0948 ?"},"content":{"rendered":"<p>\u0928\u092e\u0938\u094d\u0915\u093e\u0930 \u0926\u094b\u0938\u094d\u0924\u094b\u0902 \u0907\u0938 \u092a\u094b\u0938\u094d\u091f \u092e\u0947\u0902 \u0906\u092a\u0915\u094b\u00a0<strong>PKI<\/strong>\u00a0\u092f\u093e\u0928\u093f\u00a0<strong>Public Key Infrastructure<\/strong> \u0915\u0940 \u091c\u093e\u0928\u0915\u093e\u0930\u0940 \u092a\u095d\u0928\u0947 \u0915\u094b \u092e\u093f\u0932\u0947\u0917\u0940,\u091c\u0948\u0938\u0947 \u0915\u0940\u00a0<strong>PKI \u0915\u094d\u092f\u093e \u0939\u0948<\/strong>,<strong>PKI in Hindi<\/strong>,\u0914\u0930 \u0938\u093e\u0925 \u0939\u0940 \u091c\u093e\u0928\u0947\u0902\u0917\u0947 \u0907\u0938\u0915\u093e \u0915\u094d\u092f\u093e \u0915\u093e\u0930\u094d\u092f \u0939\u0948\u0964<\/p>\n<p><strong>PKI\u00a0<\/strong>\u0915\u094b \u0938\u092e\u091d\u0928\u0947 \u0938\u0947 \u092a\u0939\u0932\u0947 \u0906\u092a\u0915\u094b\u00a0<strong>Encryption<\/strong> \u0915\u094b \u0938\u092e\u091d\u0928\u093e \u0939\u094b\u0917\u093e,\u092f\u093e\u0928\u093f \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u0936\u0928 \u0915\u094d\u092f\u093e \u0939\u094b\u0924\u093e \u0939\u0948\u0964 \u0905\u0917\u0930 \u0938\u093e\u0927\u093e\u0930\u0923 \u0936\u092c\u094d\u0926\u094b \u092e\u0947\u0902 \u0915\u0939\u0947\u0902 \u0924\u094b \u092f\u0939 \u090f\u0915 \u092a\u094d\u0930\u0915\u093e\u0930 \u0915\u0940\u00a0<strong>Security key<\/strong> \u0939\u094b\u0924\u0940 \u0939\u0948, \u091c\u093f\u0938\u0915\u093e \u0907\u0938\u094d\u0924\u0947\u092e\u093e\u0932 \u0921\u093e\u091f\u093e \u0915\u094b \u0938\u0941\u0930\u0915\u094d\u0937\u093f\u0924 \u0930\u0916\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n<p>\u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u0936\u0928 \u0926\u094d\u0935\u093e\u0930\u093e \u0921\u093e\u091f\u093e \u0915\u0947 \u0905\u0938\u0932 \u0930\u0942\u092a \u092e\u0947\u0902 \u092c\u0926\u0932\u093e\u0935 \u0939\u094b \u091c\u093e\u0924\u093e \u0939\u0948,\u091c\u093f\u0938\u0947 \u0938\u092e\u091d\u0928\u093e \u092f\u093e \u092a\u095d\u0928\u093e \u0915\u093f\u0938\u0940 \u0915\u0947 \u0932\u093f\u090f \u092d\u0940 \u0938\u0902\u092d\u0935 \u0928\u0939\u0940\u0902 \u0939\u094b\u0924\u093e \u0939\u0948\u0964 \u0914\u0930 \u092f\u0926\u093f \u0907\u0938\u0947 \u092a\u095d\u0928\u093e \u0939\u094b,\u092f\u093e\u0928\u093f \u092b\u093f\u0930 \u0938\u0947 \u0921\u093e\u091f\u093e \u0915\u094b \u0909\u0938\u0915\u0947 \u0905\u0938\u0932 \u0930\u0942\u092a \u092e\u0947\u0902 \u0932\u093e\u0928\u093e \u0939\u094b, \u0924\u094b \u0906\u092a\u0915\u0947 \u092a\u093e\u0938 \u0907\u0938\u0915\u0940\u00a0<strong>Key\u00a0<\/strong>\u0939\u094b\u0928\u0940 \u091a\u093e\u0939\u093f\u090f \u091c\u093f\u0938\u0915\u0947 \u0926\u094d\u0935\u093e\u0930\u093e \u0939\u0940 \u0907\u0938\u0947\u00a0<strong>Decrypt <\/strong>\u0915\u093f\u092f\u093e \u091c\u093e \u0938\u0915\u0924\u093e \u0939\u0948\u0964 \u0905\u092c \u091c\u093e\u0928\u0924\u0947 \u0939\u0948\u0902\u00a0<strong>PKI<\/strong>\u00a0\u0915\u094d\u092f\u093e \u0939\u0948\u0964<\/p>\n<h2 class=\"has-luminous-vivid-orange-color has-text-color\">PKI \u0915\u094d\u092f\u093e \u0939\u0948\u0964 What is PKI in Hindi<\/h2>\n<p><strong>PKI<\/strong>\u00a0(<strong>Public Key Infrastructure<\/strong>) \u092e\u0947\u0902\u00a0<strong>Keys<\/strong>\u00a0\u0914\u0930\u00a0<strong>Certificates\u00a0<\/strong>\u0915\u094b \u092e\u0948\u0928\u0947\u091c \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964 \u092f\u0939 \u090f\u0915 \u092a\u094d\u0930\u0915\u093e\u0930 \u0915\u093e \u0907\u0902\u091f\u0930\u0928\u0947\u091f \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u0936\u0928 \u0939\u0948,\u091c\u093f\u0938\u0915\u0947 \u0926\u094d\u0935\u093e\u0930\u093e \u0907\u0902\u091f\u0930\u0928\u0947\u091f \u092a\u0930 User\u2019s \u0914\u0930 \u0915\u0902\u092a\u094d\u092f\u0942\u091f\u0930 \u0915\u0947 \u092c\u0940\u091a \u0939\u094b\u0928\u0947 \u0935\u093e\u0932\u0947 \u0921\u093e\u091f\u093e \u0915\u0947 \u0906\u0926\u093e\u0928-\u092a\u094d\u0930\u0926\u093e\u0928 \u0915\u094b \u0938\u0941\u0930\u0915\u094d\u0937\u093f\u0924 \u0930\u0916\u093e \u091c\u093e\u0924\u093e \u0939\u0948,\u092f\u093e\u0928\u093f \u090f\u0915 User \u0914\u0930 Server (Website) \u0915\u0947 \u092c\u0940\u091a \u0939\u094b\u0928\u0947 \u0935\u093e\u0932\u0947 \u0915\u092e\u094d\u092f\u0941\u0928\u093f\u0915\u0947\u0936\u0928 \u0915\u094b PKI \u0915\u0947 \u092e\u093e\u0927\u094d\u092f\u092e \u0938\u0947 Protect \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n<p><strong>Public Key Infrastructure<\/strong>\u00a0\u0915\u0947 \u0905\u0902\u0924\u0930\u094d\u0917\u0924 \u0915\u0941\u091b Rules,Policies \u0914\u0930 Procedures \u0906\u0924\u0947 \u0939\u0948\u0902,\u091c\u093f\u0928\u0915\u0940 \u092e\u0926\u0926 \u0938\u0947 \u090f\u0915 User \u0907\u0902\u091f\u0930\u0928\u0947\u091f \u092a\u0930 \u0905\u092a\u0928\u0947 \u0926\u094d\u0935\u093e\u0930\u093e \u092d\u0947\u091c\u0947 \u091c\u093e \u0930\u0939\u0947 \u0921\u093e\u091f\u093e \u0915\u094b\u00a0<strong>Encrypt<\/strong>\u00a0\u0914\u0930\u00a0<strong>Sign<\/strong>\u00a0\u0915\u0930 \u0938\u0915\u0924\u093e \u0939\u0948\u0964 \u0914\u0930 \u090f\u0915\u00a0<strong>Digital Certificate issue<\/strong>\u00a0\u0915\u0930 \u0938\u0915\u0924\u093e \u0939\u0948,\u091c\u093f\u0938\u0938\u0947 \u0915\u0940 \u090f\u0915\u00a0<strong>Secure\u00a0<\/strong>\u0915\u0928\u0947\u0915\u094d\u0936\u0928 \u092c\u0928 \u0938\u0915\u0947 \u0914\u0930 data \u0915\u0947\u00a0<strong>Source<\/strong>\u00a0\u0915\u094b\u00a0<strong>Identify<\/strong>\u00a0\u0915\u093f\u092f\u093e \u091c\u093e \u0938\u0915\u0947\u0964<\/p>\n<p>\u0935\u0948\u0938\u0947 \u0924\u094b \u092c\u093f\u0928\u093e PKI \u0915\u0947 \u092d\u0940 \u0915\u093f\u0938\u0940 \u0938\u0902\u0935\u0947\u0926\u0928\u0936\u0940\u0932 \u0921\u093e\u091f\u093e \u0915\u094b \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u091f \u0915\u0930 \u0907\u0902\u091f\u0928\u0947\u091f \u0926\u094d\u0935\u093e\u0930\u093e \u092d\u0947\u091c\u093e \u091c\u093e \u0938\u0915\u0924\u093e \u0939\u0948,\u0932\u0947\u0915\u093f\u0928 \u0909\u0938\u092e\u0947 User \u0915\u0940 Identity \u0915\u094b \u0938\u0941\u0928\u093f\u0936\u094d\u091a\u093f\u0924 \u0928\u0939\u0940\u0902 \u0915\u093f\u092f\u093e \u091c\u093e \u0938\u0915\u0924\u093e \u0939\u0948\u0964<\/p>\n<p>\u0906\u091c \u0915\u0947 \u0938\u092e\u092f \u092e\u0947\u0902 Web browser,Online Shopping,Banking sites,Online Money Transfer \u0907\u0924\u094d\u092f\u093e\u0926\u093f \u0938\u092d\u0940 \u092e\u0947\u0902\u00a0<strong>PKI<\/strong>,\u00a0<strong>Public Key Infrastructure<\/strong>\u00a0\u0915\u093e \u0907\u0938\u094d\u0924\u0947\u092e\u093e\u0932 \u0915\u093f\u092f\u093e<br \/>\n\u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n<p>\u091c\u0948\u0938\u0947 \u0915\u0940 \u0906\u092a\u0928\u0947 \u090a\u092a\u0930 \u092a\u095d\u093e PKI \u090f\u0915 \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u0936\u0928 \u0939\u0948,\u0907\u0938\u0947 \u0906\u092a\u00a0<strong>Cyber security<\/strong> \u0915\u093e \u090f\u0915 \u0922\u093e\u0902\u091a\u093e \u092d\u0940 \u0915\u0939 \u0938\u0915\u0924\u0947 \u0939\u0948\u0902,\u091c\u093f\u0938\u0938\u0947 \u0907\u0902\u091f\u0930\u0928\u0947\u091f \u092a\u0930 Server (Website) \u0914\u0930 Client \u0915\u0947 \u092c\u0940\u091a \u0915\u0947 \u0915\u092e\u094d\u092f\u0941\u0928\u093f\u0915\u0947\u0936\u0928 \u0915\u094b \u0938\u0941\u0930\u0915\u094d\u0937\u093e \u092e\u093f\u0932\u0924\u0940 \u0939\u0948\u0964<\/p>\n<p>PKI \u0907\u0902\u092b\u094d\u0930\u093e\u0938\u094d\u091f\u094d\u0930\u0915\u094d\u091f\u0930 \u092a\u0942\u0930\u0940 \u0924\u0930\u0939 \u0938\u0947 \u0921\u093f\u091c\u093f\u091f\u0932 \u0938\u093f\u0917\u094d\u0928\u0947\u091a\u0930 \u091f\u0947\u0915\u094d\u0928\u094b\u0932\u0949\u091c\u0940 \u092a\u0930 \u0928\u093f\u0930\u094d\u092d\u0930 \u0915\u0930\u0924\u093e \u0939\u0948,\u0907\u0938\u0915\u0940 \u0915\u093e\u0930\u094d\u092f\u092a\u094d\u0930\u0923\u093e\u0932\u0940 \u092e\u0947\u0902 \u0926\u094b \u0905\u0932\u0917\u00a0Cryptographic Keys \u0915\u093e \u0907\u0938\u094d\u0924\u0947\u092e\u093e\u0932 \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948,\u091c\u093f\u0938\u092e\u0947 \u092a\u0939\u0932\u0940 \u0939\u0948\u00a0<strong>Public Key\u00a0<\/strong>\u0914\u0930 \u0926\u0942\u0938\u0930\u0940 \u0939\u0948\u00a0<strong>Private Key<\/strong>.<\/p>\n<p>\u0915\u092e\u094d\u092f\u0941\u0928\u093f\u0915\u0947\u0936\u0928 \u0915\u0930 \u0930\u0939\u0947 \u0926\u094b\u0928\u094b\u0902 \u092a\u093e\u0930\u094d\u091f\u093f\u092f\u094b\u0902 \u092f\u093e\u0928\u093f \u0938\u0930\u094d\u0935\u0930 \u0914\u0930 \u092f\u0942\u091c\u0930 \u0926\u094b\u0928\u094b\u0902 \u0915\u0947 \u092a\u093e\u0938 \u0905\u092a\u0928\u0940 Public \u0914\u0930 Private Key \u0939\u094b\u0924\u0940 \u0939\u0948\u0902\u0964 Public Key \u0939\u0930 \u0915\u094b\u0908 \u092a\u094d\u0930\u093e\u092a\u094d\u0924 \u0915\u0930 \u0938\u0915\u0924\u093e \u0939\u0948,\u091c\u094b \u092d\u0940 Server (Website) \u0938\u0947 \u0915\u0928\u0947\u0915\u094d\u091f \u0939\u0948,\u0914\u0930 Private key \u0915\u094b \u0917\u0941\u092a\u094d\u0924 (Secret) \u0930\u0916\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n<p><strong>Public key<\/strong>\u00a0\u0926\u094d\u0935\u093e\u0930\u093e \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u091f \u0915\u093f\u090f \u0917\u090f \u0921\u093e\u091f\u093e \u0915\u094b \u0909\u0938\u0915\u0940\u00a0<strong>Private Key<\/strong> \u0938\u0947 \u0921\u093f\u0915\u094d\u0930\u093f\u092a\u094d\u091f \u0915\u093f\u092f\u093e \u091c\u093e \u0938\u0915\u0924\u093e \u0939\u0948,\u0914\u0930 \u092f\u0926\u093f Private Key \u0915\u093e \u0907\u0938\u094d\u0924\u0947\u092e\u093e\u0932 \u0921\u093e\u091f\u093e \u0915\u094b \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u091f \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948,\u0924\u094b \u0910\u0938\u0947 \u092e\u0947\u0902 Public key \u0915\u0947 \u0926\u094d\u0935\u093e\u0930\u093e \u0909\u0938\u0947 \u0921\u093f\u0915\u094d\u0930\u093f\u092a\u094d\u091f \u0915\u093f\u092f\u093e \u091c\u093e \u0938\u0915\u0924\u093e \u0939\u0948\u0964<\/p>\n<p>\u0924\u094b \u0907\u0902\u091f\u0930\u0928\u0947\u091f \u092a\u0930 \u0915\u093f\u0938\u0940 \u092d\u0940 \u092a\u094d\u0930\u0915\u093e\u0930 \u0915\u0947 \u0915\u092e\u094d\u092f\u0941\u0928\u093f\u0915\u0947\u0936\u0928 \u092f\u093e \u0921\u093e\u091f\u093e \u091f\u094d\u0930\u093e\u0902\u0938\u092b\u0930 \u0915\u0947 \u0926\u094c\u0930\u093e\u0928<strong>\u00a0PKI<\/strong> \u0915\u0947 \u0926\u094d\u0935\u093e\u0930\u093e\u00a0<strong>User Identity<\/strong>\u00a0\u0915\u094b verify \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948,\u0914\u0930 \u0921\u093e\u091f\u093e \u0915\u092e\u094d\u092f\u0941\u0928\u093f\u0915\u0947\u0936\u0928 \u0915\u0947 \u0932\u093f\u090f \u090f\u0915 \u0938\u0941\u0930\u0915\u094d\u0937\u093f\u0924 \u092e\u093e\u0930\u094d\u0917 \u0924\u0948\u092f\u093e\u0930 \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n<h3 class=\"has-luminous-vivid-orange-color has-text-color\">Pki (Public Key Infrastructure) \u0915\u0947 Components.<\/h3>\n<p><strong>Public Key :-<\/strong> \u092f\u0939 \u090f\u0915 \u0915\u094d\u0930\u093f\u092a\u094d\u091f\u094b\u0917\u094d\u0930\u093e\u092b\u093c\u093f\u0915 key \u0939\u094b\u0924\u0940 \u0939\u0948,\u091c\u093f\u0938\u0947 \u0915\u093f\u0938\u0940 \u0915\u0947 \u0938\u093e\u0925 \u092d\u0940 \u0936\u0947\u092f\u0930 \u0915\u093f\u092f\u093e \u091c\u093e \u0938\u0915\u0924\u093e \u0939\u0948\u0964 \u0907\u0938\u0915\u093e \u0907\u0938\u094d\u0924\u0947\u092e\u093e\u0932 Private Key \u0926\u094d\u0935\u093e\u0930\u093e \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u091f\u0940 \u0921\u093e\u091f\u093e \u0915\u094b \u0921\u093f\u0915\u094d\u0930\u093f\u092a\u094d\u091f \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n<p><strong>Private Key :-<\/strong> \u092a\u094d\u0930\u093e\u0907\u0935\u0947\u091f key \u0915\u093e \u0907\u0938\u094d\u0924\u0947\u092e\u093e\u0932 Recipient \u0926\u094d\u0935\u093e\u0930\u093e \u0915\u093f\u0938\u0940 \u092e\u0948\u0938\u0947\u091c \u0915\u094b \u0921\u093f\u0915\u094d\u0930\u093f\u092a\u094d\u091f \u0915\u0930\u0928\u0947 \u0915\u0947 \u0932\u093f\u090f \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948,\u091c\u093f\u0938\u0947 \u0909\u0938 \u0938\u0947 \u091c\u0941\u0921\u093c\u0940 Public Key \u0926\u094d\u0935\u093e\u0930\u093e \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u091f \u0915\u093f\u092f\u093e \u0917\u092f\u093e \u0939\u094b\u0964<\/p>\n<p><strong>Certification Authority (CA) :-<\/strong> \u0938\u0930\u094d\u091f\u093f\u092b\u093f\u0915\u0947\u0936\u0928 \u0905\u0925\u0949\u0930\u093f\u091f\u0940 \u092f\u093e\u0928\u093f CA \u0926\u094d\u0935\u093e\u0930\u093e \u092f\u0942\u091c\u0930 \u092f\u093e \u0915\u094d\u0932\u093e\u0907\u0902\u091f \u0915\u094b \u0938\u0930\u094d\u091f\u093f\u092b\u093f\u0915\u0947\u091f issue \u0914\u0930 Revoke \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948,\u091c\u093f\u0938\u092e\u0947 User Name,Public Key \u0914\u0930 \u0926\u0942\u0938\u0930\u0940 Identifiable information \u0939\u094b\u0924\u0940 \u0939\u0948,\u0938\u0930\u094d\u091f\u093f\u092b\u093f\u0915\u0947\u091f issue \u0915\u0930\u0928\u0947 \u0938\u0947 \u092a\u0939\u0932\u0947 CA \u092f\u0942\u091c\u0930 \u0915\u0940 identity \u0915\u094b \u0935\u0947\u0930\u0940\u092b\u093e\u0908 \u0915\u0930\u0924\u0940 \u0939\u0948\u0964<\/p>\n<p><strong>Registration Authority (RA) :-<\/strong>\u00a0RA \u0915\u094b CA \u0915\u0947 Subordinate \u0915\u0947 \u0930\u0942\u092a \u092e\u0947\u0902 \u091c\u093e\u0928\u093e \u091c\u093e\u0924\u093e \u0939\u0948,\u091c\u092c \u092d\u0940 \u0915\u092d\u0940 Digital Certificate \u0915\u094b \u0935\u0947\u0930\u0940\u092b\u093e\u0908 \u0915\u0930\u0928\u0947 \u0915\u0940 request generate \u0939\u094b\u0924\u0940 \u0939\u0948,\u0924\u094b \u0935\u0939 Request \u0938\u0940\u0927\u0947 (RA) \u0915\u0947 \u092a\u093e\u0938 \u091c\u093e\u0924\u0940 \u0939\u0948\u0964 \u0914\u0930 \u0909\u0938\u0915\u0947 \u092c\u093e\u0926 RA \u0909\u0938 \u092a\u0930 \u092b\u0948\u0938\u0932\u093e \u0932\u0947\u0924\u093e \u0939\u0948\u0964<\/p>\n<p><strong>Certificate Database :-<\/strong>\u00a0\u0938\u0930\u094d\u091f\u093f\u092b\u093f\u0915\u0947\u091f \u0921\u0947\u091f\u093e\u092c\u0947\u0938 \u0926\u094d\u0935\u093e\u0930\u093e Certificates \u0915\u093e \u0930\u093f\u0915\u0949\u0930\u094d\u0921 \u0938\u094d\u091f\u094b\u0930 \u0915\u093f\u092f\u093e \u0939\u0948\u0964<\/p>\n<p><strong>Digital Certificate :-<\/strong> \u092f\u0939 \u090f\u0915 \u0907\u0932\u0947\u0915\u094d\u091f\u094d\u0930\u0949\u0928\u093f\u0915 \u0938\u0930\u094d\u091f\u093f\u092b\u093f\u0915\u0947\u091f \u0915\u0947 \u0930\u0942\u092a \u092e\u0947\u0902 \u0915\u093f\u0938\u0940 User, Organisation \u092f\u093e Computer) \u0915\u0940 \u0921\u093f\u091c\u093f\u091f\u0932 \u092a\u0939\u091a\u093e\u0928 \u0939\u094b\u0924\u0940 \u0939\u0948,\u091c\u093f\u0938\u092e\u0947 \u0909\u0928\u0915\u0940 Identity \u0915\u094b Public key \u092e\u0947\u0902 Bind \u0915\u093f\u092f\u093e \u091c\u093e\u0924\u093e \u0939\u0948,\u0907\u0938 \u0932\u093f\u090f \u0907\u0938\u0947 Public Key \u0938\u0930\u094d\u091f\u093f\u092b\u093f\u0915\u0947\u091f \u092d\u0940 \u0915\u0939\u093e \u091c\u093e\u0924\u093e \u0939\u0948\u0964<\/p>\n<p>\u0926\u094b\u0938\u094d\u0924\u094b\u0902 \u0906\u092a\u0928\u0947 \u092a\u095d\u093e\u00a0<strong>PKI \u0915\u094d\u092f\u093e \u0939\u0948,PKI in Hindi<\/strong>\u00a0\u0914\u0930 \u0939\u092e\u0947\u0902 \u0909\u092e\u094d\u092e\u0940\u0926 \u0939\u0948,PKI \u0938\u0947 \u091c\u0941\u095c\u093e \u092f\u0939 \u092a\u094b\u0938\u094d\u091f \u0906\u092a\u0915\u094b \u0905\u091a\u094d\u091b\u093e \u0932\u0917\u093e \u0939\u094b\u0917\u093e,\u092f\u0926\u093f \u092f\u0939 \u091c\u093e\u0928\u0915\u093e\u0930\u0940 \u0906\u092a\u0915\u094b \u0905\u091a\u094d\u091b\u0940 \u0932\u0917\u0940 \u0939\u0948,\u0924\u094b \u0928\u093f\u0935\u0947\u0926\u0928 \u0939\u0940 \u0915\u0940 \u0907\u0938\u0947 \u0905\u092a\u0928\u0947 \u092e\u093f\u0924\u094d\u0930\u094b\u0902 \u0915\u094b \u092d\u0940 \u0936\u0947\u092f\u0930 \u0915\u0930\u0947\u0902 \u0927\u0928\u094d\u092f\u0935\u093e\u0926\u0964<\/p>\n<div class=\"addtoany_share_save_container addtoany_content addtoany_content_bottom\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u0928\u092e\u0938\u094d\u0915\u093e\u0930 \u0926\u094b\u0938\u094d\u0924\u094b\u0902 \u0907\u0938 \u092a\u094b\u0938\u094d\u091f \u092e\u0947\u0902 \u0906\u092a\u0915\u094b\u00a0PKI\u00a0\u092f\u093e\u0928\u093f\u00a0Public Key Infrastructure \u0915\u0940 \u091c\u093e\u0928\u0915\u093e\u0930\u0940 \u092a\u095d\u0928\u0947 \u0915\u094b \u092e\u093f\u0932\u0947\u0917\u0940,\u091c\u0948\u0938\u0947 \u0915\u0940\u00a0PKI \u0915\u094d\u092f\u093e \u0939\u0948,PKI in Hindi,\u0914\u0930 \u0938\u093e\u0925 \u0939\u0940 \u091c\u093e\u0928\u0947\u0902\u0917\u0947 \u0907\u0938\u0915\u093e \u0915\u094d\u092f\u093e \u0915\u093e\u0930\u094d\u092f \u0939\u0948\u0964 PKI\u00a0\u0915\u094b \u0938\u092e\u091d\u0928\u0947 \u0938\u0947 \u092a\u0939\u0932\u0947 \u0906\u092a\u0915\u094b\u00a0Encryption \u0915\u094b \u0938\u092e\u091d\u0928\u093e \u0939\u094b\u0917\u093e,\u092f\u093e\u0928\u093f \u090f\u0928\u094d\u0915\u094d\u0930\u093f\u092a\u094d\u0936\u0928 \u0915\u094d\u092f\u093e \u0939\u094b\u0924\u093e \u0939\u0948\u0964 \u0905\u0917\u0930 \u0938\u093e\u0927\u093e\u0930\u0923 \u0936\u092c\u094d\u0926\u094b \u092e\u0947\u0902 \u0915\u0939\u0947\u0902 \u0924\u094b \u092f\u0939 \u090f\u0915 \u092a\u094d\u0930\u0915\u093e\u0930 \u0915\u0940\u00a0Security key \u0939\u094b\u0924\u0940 \u0939\u0948, \u091c\u093f\u0938\u0915\u093e \u0907\u0938\u094d\u0924\u0947\u092e\u093e\u0932 \u0921\u093e\u091f\u093e \u0915\u094b \u0938\u0941\u0930\u0915\u094d\u0937\u093f\u0924 [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":5640,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[794,795],"class_list":["post-5639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ict","tag-public-key-infrastructure","tag-what-is-pki"],"_links":{"self":[{"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/posts\/5639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/comments?post=5639"}],"version-history":[{"count":0,"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/posts\/5639\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/media\/5640"}],"wp:attachment":[{"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/media?parent=5639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/categories?post=5639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.reilsolar.com\/library\/wp-json\/wp\/v2\/tags?post=5639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}