CHAPTER

13  Public Key Infrastructure and Encryption

ENCRYPTION IS A PART of your everyday life. Each time you access a secure Web site, conduct a transaction at an ATM, or check your e-mail, encryption lurks behind the scenes providing the secure transmission of information. Encryption relies upon the use of encryption keys to ensure that information is readable only by the intended recipient. Distributing and managing these keys is one of the trickiest parts of implementing an encryption system and, in many encryption approaches, the public key infrastructure (PKI) fills that role.

This chapter covers the essentials of PKI: what it is, how it works, implementation security levels, and how it is supported.

Chapter 13 Topics

This chapter covers ...

Get Access Control, Authentication, and Public Key Infrastructure, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.