Chapter 8: Using a Public Key Infrastructure
Malicious actors constantly launch assaults on a network, such as malware, spoofing, and Denial of Service (DoS) attacks. As a result, during a data transaction on a network, it's important to have the confidence that you are communicating with an authorized entity. A public key infrastructure (PKI) enables the secure exchange of data between two parties.
In this chapter, we'll learn how a PKI is the cornerstone for most digital transactions that require encryption. We'll outline how a PKI provides the trust required when exchanging data, and how components (such as algorithms) and a certificate authority (CA) work together. Next, we'll see how a PKI manages, securely stores, and distributes session keys, along with outlining the difference between a trusted root certificate and a self-signed certificate. So that you understand the many moving parts of a transaction, we'll examine the heart of a PKI: the elements...