© fandijki/ShutterStock, Inc.

CHAPTER
11

Public Key Infrastructure and Encryption

ENCRYPTION IS A PART of your everyday life. Each time you access a secure website, conduct a transaction at an ATM, or check your email, encryption lurks behind the scenes, providing the secure transmission of information. Encryption relies on the use of encryption keys to ensure that information is only readable by the intended recipient. Distributing and managing these keys is one of the trickiest parts of implementing an encryption system and, in many encryption approaches, the public key infrastructure (PKI) fills that role.

This chapter covers the essentials of PKI: what it is, how it works, implementation security levels, and how it is supported.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.25.74