How it works
- By Brian Robinson
- Sep 03, 2001
The key to PKI
A public-key infrastructure combines technology and administrative processes
to provide security for communications and business transactions conducted
via the Internet. It uses digital certificates, issued by a certificate
authority, to verify the identity of the parties in a transaction.
Digital certificates contain an individual's or organization's public
key software that identifies the owner of the key along with other authenticating
information. The certificate authority is a trusted third party that verifies
the integrity of the data within the certificate, validates its use and
then cryptographically seals it.
Brian Robinson is a freelance writer based in Portland, Ore.