Chapter 2 How does PKI work? The Nuts and Bolts of PKI

DOI: 10.1201/9781003360674-2

The example given in the previous chapter was a deliberate simplification intended simply to set the scene. Here, we shall go into the matter in a somewhat greater depth.

Firstly, we must understand that, in the modern world, any human-to-human communication via computers and any machine-to-machine communication via computers is vulnerable. The risks from malicious hackers are very real and, every day, some organisation somewhere experiences a major data breach. It is not always reported as, typically, organisations, and especially, government agencies, do not wish to admit that they have been the subject of an attack and have subsequently lost a great deal ...

Get PKI Implementation and Infrastructures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.