Chapter 8: Using a Public Key Infrastructure
Malicious actors constantly launch assaults on a network, such as malware, spoofing, and Denial of Service (DoS) attacks. As a result, during a data transaction on a network, it's important to have the confidence that you are communicating with an authorized entity. A public key infrastructure (PKI) enables the secure exchange of data between two parties.
In this chapter, we'll learn how a PKI is the cornerstone for most digital transactions that require encryption. We'll outline how a PKI provides the trust required when exchanging data, and how components (such as algorithms) and a certificate authority (CA) work together. Next, we'll see how a PKI manages, securely stores, and distributes session ...
Get Modern Cryptography for Cybersecurity Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.