Public key encryption and Public key infrastructure: Difference between pages
From ACT Wiki
(Difference between pages)
imported>Doug Williamson (Add link.) |
imported>Doug Williamson m (Spacing 20/8/13) |
||
Line 1: | Line 1: | ||
(PKI). | |||
Public key | Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party. | ||
== See also == | == See also == | ||
* [[ | * [[Digital signature]] | ||
* [[ | * [[Secure Sockets Layer]] | ||
[[Category:Technology]] | [[Category:Technology]] |
Revision as of 15:57, 20 August 2013
(PKI).
Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.