Public key infrastructure: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Administrator
(CSV import)
 
imported>Doug Williamson
(Add link.)
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
(PKI). Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.
(PKI).  
 
Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.
 


== See also ==
== See also ==
* [[Digital signature]]
* [[Digital signature]]
* [[Key]]
* [[Public]]
* [[Secure Sockets Layer]]
* [[Secure Sockets Layer]]


[[Category:Technology]]

Latest revision as of 07:38, 22 June 2023

(PKI).

Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.


See also