Chapter 13. Public Key Infrastructure and Encryption

A PUBLIC KEY INFRASTRUCTURE (PKI) and encryption are used by everyone, every day. Employing the technologies and algorithms associated with them provides a secure system for transmission of data, whether the data is at rest or in motion. Ensuring the appropriate encryption algorithm is used for appropriate services will help provide a secure environment.

This chapter covers the essentials of PKI: what it is, how it works, implementation security levels, and how it is supported.

Get Access Control, Authentication, and Public Key Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.