Certificates

PKI in a Nutshell

Posted on by  
Ronald Koster

This blog briefly describes theoretically how Public Key Infrastructure (PKI) works. It also introduces the key concepts used in PKI. This is done by describing encryption, decryption, hashing, signing, and authentication using mathematical notations.

Continue reading →

shadow-left