Chapter 8: Using a Public Key Infrastructure

Malicious actors constantly launch assaults on a network, such as malware, spoofing, and Denial of Service (DoS) attacks. As a result, during a data transaction on a network, it's important to have the confidence that you are communicating with an authorized entity. A public key infrastructure (PKI) enables the secure exchange of data between two parties.

In this chapter, we'll learn how a PKI is the cornerstone for most digital transactions that require encryption. We'll outline how a PKI provides the trust required when exchanging data, and how components (such as algorithms) and a certificate authority (CA) work together. Next, we'll see how a PKI manages, securely stores, and distributes session ...

Get Modern Cryptography for Cybersecurity Professionals now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.