How it works

The key to PKI

A public-key infrastructure combines technology and administrative processes

to provide security for communications and business transactions conducted

via the Internet. It uses digital certificates, issued by a certificate

authority, to verify the identity of the parties in a transaction.

Digital certificates contain an individual's or organization's public

key software that identifies the owner of the key along with other authenticating

information. The certificate authority is a trusted third party that verifies

the integrity of the data within the certificate, validates its use and

then cryptographically seals it.

About the Author

Brian Robinson is a freelance writer based in Portland, Ore.

Featured

  • Workforce
    White House rainbow light shutterstock ID : 1130423963 By zhephotography

    White House rolls out DEIA strategy

    On Tuesday, the Biden administration issued agencies a roadmap to guide their efforts to develop strategic plans for diversity, equity, inclusion and accessibility (DEIA), as required under a as required under a June executive order.

  • Defense
    software (whiteMocca/Shutterstock.com)

    Why DOD is so bad at buying software

    The Defense Department wants to acquire emerging technology faster and more efficiently. But will its latest attempts to streamline its processes be enough?

Stay Connected