Public key infrastructure: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Charles Cresswell No edit summary |
imported>Doug Williamson (Add link.) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
(PKI). Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party. | (PKI). | ||
Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party. | |||
== See also == | == See also == | ||
* [[Digital signature]] | * [[Digital signature]] | ||
* [[Key]] | |||
* [[Public]] | |||
* [[Secure Sockets Layer]] | * [[Secure Sockets Layer]] | ||
[[Category: | [[Category:Technology]] |
Latest revision as of 07:38, 22 June 2023
(PKI).
Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.