Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 15. Asymmetric Encryption and PKI > Public Key Infrastructure

Public Key Infrastructure

A public key infrastructure (PKI) ensures confidentiality, integrity, and authentication in an enterprise and is based on the fundamentals of asymmetric encryption. PKI solutions are based on digital certificates and a trusted third-party trust model.

PKI uses the power of private and public keys, digital signatures, and trust models that are derived from asymmetric encryption. PKI provides services that include identity management, software code signing, encrypted file systems, email, virtual private networks (VPNs), and others.

The PKI is a set of technical, organizational, and legal components. Those components are needed to establish a system that enables large-scale use of public key cryptography to provide authenticity, confidentiality, integrity, and nonrepudiation services.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint