© The Author(s), under exclusive license to APress Media, LLC , part of Springer Nature 2021
S. BoonkrongAuthentication and Access Controlhttps://doi.org/10.1007/978-1-4842-6570-3_2

2. Public Key Infrastructure

Sirapat Boonkrong1  
(1)
Nakhon Ratchasima, Thailand
 

It is not possible to discuss authentication without at least touching the concept of public key infrastructure or PKI. This is because today’s complex ecommerce or any Internet transactions require rigorous and thorough security mechanisms. Public key cryptography is one such mechanism that can support the required security measures and solve security problems.

Public key infrastructure, as the name suggests, works based on asymmetric cryptography whose benefits include confidentiality, integrity, ...

Get Authentication and Access Control: Practical Cryptography Methods and Tools now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.