Chapter 3 What are the primary applications for a PKI? How applications are changing

DOI: 10.1201/9781003360674-3

The original intention of public key infrastructure (PKI) was to improve upon the symmetrical encryption that had been in use between data entities. There was nothing particularly wrong with symmetrical encryption when implemented properly, but it did mean that, should the key or pass phrase be compromised and the algorithm guessed, then any messages or information thus encrypted could be easily decrypted by whoever had the key. There were ways in which this could be made safer. For example, by ensuring that every single data exchange was encrypted slightly differently. Also, a non-standard encryption algorithm could be used which ...

Get PKI Implementation and Infrastructures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.