Public-key Infrastructure (PKI)

Asymmetric encryption requires two keys instead of one as in symmetric encryption. In public key infrastructure (PKI), asymmetric encryption is used. Watch this video to learn about PKI and how the public and private keys are used to encrypt and decrypt information. Also, learn about the two types of certificate authorities (CAs). What are the advantages and disadvantages of the private CA? To understand PKI you should also understand the levels of certificate authorities, the concept of the digital certificate, and the components of the digital certificate.

Source: PaceIT Online,
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Friday, November 20, 2020, 5:19 AM