How it works

The key to PKI

A public-key infrastructure combines technology and administrative processes

to provide security for communications and business transactions conducted

via the Internet. It uses digital certificates, issued by a certificate

authority, to verify the identity of the parties in a transaction.

Digital certificates contain an individual's or organization's public

key software that identifies the owner of the key along with other authenticating

information. The certificate authority is a trusted third party that verifies

the integrity of the data within the certificate, validates its use and

then cryptographically seals it.

About the Author

Brian Robinson is a freelance writer based in Portland, Ore.

Featured

  • innovation (Sergey Nivens/Shutterstock.com)

    VA embraces procurement challenges at scale

    Steve Kelman applauds the Department of Veterans Affairs' ambitious attempt to move beyond one-off prize-based contests to combat veteran suicides more effectively.

  • big data AI health data

    Where did the ideas for shutdowns and social distancing come from?

    Steve Kelman offers another story about hero civil servants (and a good president).

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.