Public Key Infrastructure (PKI)

Cryptography 🔒 • Authentication & Authorization 🔐 • Protocols 🔗 • Sec+ Glossary 📖 Difficulty: premium

What is Public Key Infrastructure (PKI)?

Public Key Infrastructure, or PKI, is the system of technologies, policies, roles, and processes used to create, manage, distribute, validate, and revoke digital certificates and public keys.

Examples

  • A web browser checks a website certificate issued through PKI so it can establish a trusted HTTPS connection.
  • An organization uses PKI to issue certificates to employee laptops so only approved devices can join the corporate Wi-Fi network.

Discover 🔎

Modern security depends on trust, but trust on a network cannot rely on appearance alone. A website may look genuine, an email signature may seem official, and a device may claim to belong to the company, but systems need a stronger way to verify those claims. Public Key Infrastructure exists to provide that trust framework.

PKI matters because encryption by itself is not enough. A system may be able to encrypt data, but it also needs confidence about who it is communicating with and whether a key should be trusted. That is where certificates and certificate authorities come into the picture. PKI helps turn public key cryptography into something organizations can actually use at scale.

Remember: PKI is not just about keys. It is about managing trust around those keys.

Summary 📝

Public Key Infrastructure is the framework that makes certificate-based trust possible in real systems. It manages the identities, keys, certificates, and processes that support secure communication and verification. PKI matters because it turns public key cryptography into usable trust for websites, devices, applications, and organizations.

Open the interactive lesson Browse more topics

Tip: The interactive version includes progress tracking, decks, and premium deep dives.