What is pki
Last updated: April 1, 2026
Key Facts
- PKI uses asymmetric cryptography with mathematical key pairs where one key encrypts and the other decrypts
- Digital certificates issued by Certificate Authorities (CAs) verify and bind the identity of individuals or organizations to their public keys
- PKI is fundamental to HTTPS encryption, digital signatures, email security, and secure financial transactions
- The infrastructure includes Certificate Authorities, Registration Authorities, and certificate repositories working together
- PKI enables trust and secure communication between parties who have never directly communicated before
What is Public Key Infrastructure?
Public Key Infrastructure (PKI) is a comprehensive system of policies, procedures, hardware, software, and people designed to create, manage, distribute, use, store, and revoke digital certificates and manage public-private key pairs. PKI provides the foundation for secure digital communication on the internet and in enterprise networks. It establishes trust relationships between parties and enables encryption, digital signatures, and authentication.
How PKI Works
PKI operates using asymmetric cryptography, where each user has two mathematically related keys: a public key that can be shared openly and a private key that remains secret. Information encrypted with the public key can only be decrypted with the corresponding private key, and vice versa. This fundamental principle allows secure communication between parties who have not previously exchanged keys directly.
Digital Certificates and Certificate Authorities
At the heart of PKI are digital certificates, electronic documents that bind a public key to an identity. Certificate Authorities (CAs) are trusted organizations that issue, manage, and revoke these certificates after verifying the identity of the certificate holder. When users receive a certificate, they can trust its authenticity because the CA's own certificate is recognized by browsers and systems. This creates chains of trust extending from root CAs down to individual users and servers.
PKI Applications and Use Cases
PKI enables numerous critical security functions. HTTPS uses PKI to encrypt web traffic between browsers and servers. Digital signatures allow individuals to sign documents electronically with non-repudiation—the signer cannot later deny having signed. Email encryption protects message confidentiality. Electronic banking and e-commerce rely on PKI for secure transactions. Government and enterprise systems use PKI for employee authentication, access control, and secure communications.
PKI Infrastructure Components
A complete PKI ecosystem includes multiple components: Certificate Authorities issue and revoke certificates; Registration Authorities verify user identities; Certificate repositories store and distribute certificates; Time Stamping Authorities provide evidence of when documents were created; and various management systems track key lifecycles. Organizations implementing PKI must establish policies for certificate validity periods, key lengths, revocation procedures, and disaster recovery.
Related Questions
How does public key encryption work?
Public key encryption uses two mathematically related keys: a public key available to everyone encrypts messages, and only the corresponding private key can decrypt them. This allows anyone to send secure messages to the key owner without sharing secret keys in advance. The mathematics ensures that even knowing the public key doesn't reveal the private key.
How does encryption work?
Encryption converts readable data (plaintext) into unreadable code (ciphertext) using mathematical algorithms and keys. Only someone with the correct key can decrypt the data back to its original form, ensuring privacy.
What is a digital certificate?
A digital certificate is an electronic credential that binds a public key to an individual, organization, or device identity. Issued by Certificate Authorities, certificates contain the public key, identity information, validity period, and the CA's digital signature. They enable users to verify that a public key belongs to the claimed entity.
What's the difference between public and private keys?
A public key encrypts data and is shared openly, while a private key decrypts data and must be kept secret. Together they form a secure pair where one's output becomes the other's input.
Why is PKI important for cybersecurity?
PKI is crucial for cybersecurity because it enables encryption to protect data confidentiality, digital signatures to verify authenticity and prevent repudiation, and certificate-based authentication to verify identities. PKI-based security is more scalable and secure than shared-secret methods for large systems and untrusted networks like the internet.
Why do websites need digital certificates?
Digital certificates verify that a website is legitimate and operated by the claimed organization, preventing impersonation and man-in-the-middle attacks where criminals could intercept your sensitive data.
More What Is in Daily Life
- What Is a Credit ScoreA credit score is a three-digit number, typically ranging from 300 to 850, that represents your cred…
- What Is CD rates make no sense based on length of time invested. Explain like I'm 5CD (Certificate of Deposit) rates often don't increase with longer lock-up times the way people expe…
- What is a phdA PhD (Doctor of Philosophy) is a doctoral degree earned after completing advanced academic research…
- What is a polymathA polymath is a person with deep knowledge and expertise across multiple different fields or academi…
- What is aaveAAVE stands for African American Vernacular English, a dialect with distinct grammar, pronunciation,…
- What is aarch64ARMv8-A (commonly called ARM64 or AArch64) is a 64-bit processor architecture developed by ARM Holdi…
- What is about menTopics and discussions about men typically encompass masculinity, male identity, gender roles, men's…
- What is abiturAbitur is the German academic qualification awarded upon completion of secondary education, typicall…
- What is abrosexualAbrosexual is a sexual orientation identity where a person's sexual attraction changes or fluctuates…
- What is abgABG is an Indonesian acronym standing for 'Anak Baru Gede,' which refers to adolescent girls or teen…
- What is aaaAAA batteries are a standard cylindrical battery size measuring 10.5mm in diameter and 44.5mm in len…
- What is aacAAC (Advanced Audio Codec) is a digital audio compression format that provides better sound quality …
- What is aaa gameAAA games are high-budget video games developed by large studios with budgets typically exceeding $1…
- What is a proxyA proxy is a server that acts as an intermediary between your device and the internet, forwarding yo…
- What is ableismAbleism is discrimination and prejudice against people with disabilities based on the assumption tha…
- What is absAbs, short for abdominal muscles, are the muscles in your core that flex your spine and stabilize yo…
- What is abortionAbortion is a medical procedure that ends pregnancy by removing the fetus before viability. It can b…
- What is accutaneAccutane (isotretinoin) is a powerful prescription medication derived from vitamin A used to treat s…
- What is acetaminophenAcetaminophen, also known as paracetamol, is an over-the-counter pain reliever and fever reducer use…
- What is acidAcid is a chemical substance that donates protons (hydrogen ions) to other substances, characterized…
Also in Daily Life
- How To Save Money
- Why are so many white supremacist and right wings grifters not white
- Does "I'm 20 out" mean youre 20 minutes away from where you left, or youre 20 minutes away from your destination
- Why are so many men convinced that they are ugly
- What does awol mean
- What does asl mean
- What does ad mean
- What does asap mean
- What does apex mean
- What does asmr stand for
- What does atp mean
- What causes autism
- What does abg mean
- What does am and pm mean
- What does a fox sound like
More "What Is" Questions
Trending on WhatAnswer
Browse by Topic
Browse by Question Type
Sources
- Wikipedia - Public Key Infrastructure CC-BY-SA-4.0
- NIST - Cryptography Standards and Guidelines Public Domain
- ITU - International Standards for Security Terms of Service