Public key infrastructure: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Charles Cresswell
No edit summary
imported>Doug Williamson
m (Spacing 20/8/13)
Line 1: Line 1:
(PKI). Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.
(PKI).  
 
Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.
 


== See also ==
== See also ==
Line 5: Line 8:
* [[Secure Sockets Layer]]
* [[Secure Sockets Layer]]


[[Category:Technology_and_Systems]]
[[Category:Technology]]

Revision as of 15:57, 20 August 2013

(PKI).

Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.


See also