{"id":3129,"date":"2023-02-14T18:53:15","date_gmt":"2023-02-14T18:53:15","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=3129"},"modified":"2023-02-14T18:53:23","modified_gmt":"2023-02-14T18:53:23","slug":"pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/","title":{"rendered":"PKI 101: All the PKI Basics You Need to Know in 180 Seconds"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Set your watch \u2014 we\u2019ll cover all the PKI basics you didn\u2019t know you didn\u2019t know in less time than it takes to make a good cup of coffee<\/h2>\n\n\n\n<p>Have you recently made a purchase or shared other sensitive personal information with a website? If so, public key infrastructure likely had a hand in facilitating security for your internet transactions. Let\u2019s dive right into what you need to know about PKI basics.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Public Key Infrastructure Explained: What Is PKI? A Look at the Basics<\/h2>\n\n\n\n<p><a href=\"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/\">Public key infrastructure<\/a> is the foundation of internet security and digital trust. It\u2019s the rules, technical processes, and technologies that make it possible to exchange data securely on the internet. It relies on the use of public key infrastructure, which uses asymmetric cryptography (i.e., public key cryptography) to protect sensitive data from unintended eyes. (More on asymmetric encryption is just a moment.)<\/p>\n\n\n\n<p><a href=\"https:\/\/sectigostore.com\/blog\/what-is-encryption-and-how-does-it-work\/\">Encryption<\/a> is the process of taking plaintext (i.e., readable) data and turning it into something indecipherable without the use of a secret key. On the internet, this involves using digital certificates that are issued by third-party <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-certificate-authority-certification-authorities-explained\/\">certificate authorities<\/a> (CAs). These publicly trusted entities must meet specific security standards to issue certificates.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What PKI Helps You Do<\/h2>\n\n\n\n<p>At its core, PKI enables you to do three important things (we\u2019ll dive into the specifics of these more a little later):<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li><strong>Authenticate entities you\u2019ve never met<\/strong> (users, clients, servers, and other devices). The use of digital signatures helps you verify the other party\u2019s identity, so you know you\u2019re communicating with the right person or entity.<\/li>\n\n\n\n<li><strong>Encrypt your data in transit<\/strong> (emails, files, and data transmissions). Public key encryption allows you to secure the data channel that you and the other party use to transmit data. This helps protect your data&#8217;s privacy and confidentiality by keeping it from prying eyes.<\/li>\n\n\n\n<li><strong>Protect the integrity of your data<\/strong> (ensure no one secretly modifies data). Cryptographic hashes help you ensure that your data isn\u2019t tampered with in transit.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Fundamentals of PKI: Asymmetric Cryptography Protects Data on Insecure Networks<\/h2>\n\n\n\n<p>Let\u2019s take a closer look at PKI security fundamentals to understand how it\u2019s used to secure data on the internet. Asymmetric cryptography relies on a public-private keypair:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The public key encrypts data, and<\/li>\n\n\n\n<li>The private key decrypts it.<\/li>\n<\/ul>\n\n\n\n<p>For you skimmers, here\u2019s a quick overview of PKI basics in video form:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"What is Public Key Infrastructure (PKI) by Securemetric\" width=\"940\" height=\"529\" src=\"https:\/\/www.youtube.com\/embed\/i-rtxrEz_E8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Up until the 1970s, encryption was always symmetric, meaning that one key would encrypt and decrypt data. This is why symmetric cryptography is also known as <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-private-key-in-cybersecurity\/\">private key encryption<\/a> (because it uses a single key instead of two unique ones). This means you\u2019d have to physically meet up to exchange keys with someone to communicate via this private key encryption.<\/p>\n\n\n\n<p>Obviously, this doesn\u2019t work when you\u2019re using the internet to do business with someone in another state, country, or continent. This is why <a href=\"https:\/\/sectigostore.com\/blog\/what-is-asymmetric-encryption-how-does-it-work\/\">asymmetric encryption<\/a> came into the picture. Experts realized the need for exchanging sensitive key data even when only insecure (open) channels were available.<\/p>\n\n\n\n<p>With public key cryptography, you don\u2019t have to meet up in person because you\u2019re using a cryptosystem that involves a public shared value and a private value. The sender uses the recipient\u2019s public key to encrypt data, and then the recipient decrypts it using their corresponding private (secret) key. This enables the sender to give the recipient symmetric key information that both parties can use to create a secure, symmetrically encrypted session to communicate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Asymmetric vs Symmetric Encryption<\/h3>\n\n\n\n<p>Here&#8217;s a quick overview of <a href=\"https:\/\/sectigostore.com\/blog\/public-key-vs-private-key-how-do-they-work\/\">public key vs private key<\/a> encryption:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"436\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-public-vs-private-key-cryptography-shadow-1024x436.png\" alt=\"An illustration that compares the single key of symmetric encryption with the two keys (public and private) used in asymmetric encryption.\" class=\"wp-image-3132\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-public-vs-private-key-cryptography-shadow-1024x436.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-public-vs-private-key-cryptography-shadow-300x128.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-public-vs-private-key-cryptography-shadow-560x238.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-public-vs-private-key-cryptography-shadow-940x400.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-public-vs-private-key-cryptography-shadow.png 1153w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Image caption: A side-by-side comparison that shows the most basic difference between asymmetric and symmetric encryption.<\/em><\/figcaption><\/figure>\n\n\n\n<p>Why bother using symmetric session? It\u2019s because symmetric encryption is faster than asymmetric encryption, less resource intensive, and more secure when using smaller keys. But in order to get to a point where you can use symmetric encryption when connecting with someone in another geographic location, you first need to use asymmetric encryption to securely exchange data via open networks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">PKI Basics Example: How PKI Works to Create a Secure Website Connection<\/h2>\n\n\n\n<p>Let\u2019s walk you through a basic overview of how it works when you connect to a website. This is known as an SSL\/TLS handshake. In this process, your web client (browser):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Verifies the site server\u2019s digital identity using its <\/strong><a href=\"https:\/\/sectigostore.com\/ssl-certificates\"><strong>SSL\/TLS certificate<\/strong><\/a><strong>.<\/strong> This ensures the client is connecting to the right place.<\/li>\n\n\n\n<li><strong>Uses cryptographic processes (including encryption) to create a secure channel.<\/strong> This helps to protect your data as it transmits from your device to the website\u2019s server.<\/li>\n\n\n\n<li><strong>Protects the integrity of your data.<\/strong> This way, your recipient knows your data wasn\u2019t tampered with or stolen in transit.<\/li>\n<\/ul>\n\n\n\n<p>The process looks like this:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"976\" height=\"658\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-how-pki-secures-website-connections-shadow.png\" alt=\"An illustration that walks you through the PKI basics of how public key infrastructure facilitates secure website connections between a user's client and the website's server it connects to on the other end.\" class=\"wp-image-3133\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-how-pki-secures-website-connections-shadow.png 976w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-how-pki-secures-website-connections-shadow-300x202.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-how-pki-secures-website-connections-shadow-560x378.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-how-pki-secures-website-connections-shadow-940x634.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-how-pki-secures-website-connections-shadow-400x270.png 400w\" sizes=\"auto, (max-width: 976px) 100vw, 976px\" \/><figcaption class=\"wp-element-caption\"><em>Image caption: An illustration that shows the basics of how asymmetric encryption plays a pivotal role in establishing a secure website connection. Basically, public key cryptography is used to create a secure private key session.<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">PKI Fundamentals: PKI Isn\u2019t Just About Encryption<\/h2>\n\n\n\n<p>It also uses other types of cryptographic functions \u2014 and hashing ciphers and digital signature algorithms \u2014 to help with protecting data integrity and enabling identity verification.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/sectigostore.com\/blog\/hash-function-in-cryptography-how-does-it-work\/\"><strong>Hash function<\/strong><\/a> \u2014 This form of cipher is used to convert data of any size to a fixed-length string. Unlike encryption, which is a two-way function because encrypted data is intended to be reversed, hashing isn\u2019t meant to be reverse engineered. It protects data integrity by informing you about whether data has been altered since it was signed.&nbsp; To learn more, check out our article on <a href=\"https:\/\/sectigostore.com\/blog\/hashing-vs-encryption-the-big-players-of-the-cyber-security-world\/\">hashing vs encryption<\/a>.<\/li>\n\n\n\n<li><a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-digital-signature-and-how-does-the-digital-signature-process-work\/\"><strong>Digital signature<\/strong><\/a> \u2014 A digital signature is what enables your device or operating system to idendgfgerrgfwergergearfgaergaerfgaergghtgtify an email, software executable, or another piece of data to determine whether it\u2019s authentic (i.e., came from the legitimate party, not an intruder).&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These cryptographic processes play important roles in cyber security, including in the SSL\/TLS handshake explained above.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why You Should Use PKI for Your Organization<\/h2>\n\n\n\n<p>Aside from the reasons we\u2019ve already covered (authentication, data integrity, and security), here are several other motivations for why you should use PKI to secure your organization and data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Secure access privileges at scale.<\/strong> Rather than relying strictly on traditional usernames and passwords, <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-pki-certificate\/\">PKI digital certificates<\/a> (i.e., <a href=\"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/\">X.509 digital certificates<\/a>) \u2014 particularly when paired with certificate life cycle management automation \u2014 help you secure access to your most sensitive resources and data more efficiently.<\/li>\n\n\n\n<li><strong>Instill trust in your brand.<\/strong> People are more likely to want to do business with you if they can trust your business. Having a verifiable digital identity goes a long way in helping you earn that trust.<\/li>\n\n\n\n<li><strong>Improve your Google ranking.<\/strong> If you didn\u2019t know that enabling HTTPS on your website helps improve your search ranking, now you do. (You\u2019re welcome.) So, if you want your website to have a chance of landing in Google\u2019s top 10, then you need to install an SSL\/TLS website security certificate on your server ASAP.<\/li>\n\n\n\n<li><strong>Meet regulatory requirements. <\/strong>Even if they don\u2019t necessarily mention PKI by name, many cybersecurity regulations and <a href=\"https:\/\/sectigostore.com\/blog\/data-privacy-laws-ccpa-hipaa-gdpr-glba-lgpd\/\">data privacy laws<\/a> require the security, confidentiality, and data integrity protection PKI affords. This includes:<ul><li><a href=\"https:\/\/sectigostore.com\/blog\/what-is-pci-dss-a-quick-guide-to-the-12-pci-dss-requirements\/\">Payment Card Industry Data Security Standards<\/a> (PCI DSS)<\/li><\/ul><ul><li><a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/index.html\">Health Insurance Portability and Accountability Act<\/a> (HIPAA) Security Rule<\/li><\/ul><ul><li>European Union\u2019s <a href=\"https:\/\/gdpr-info.eu\/\">General Data Protection Regulation<\/a> (GDPR)<\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\">California Consumers Privacy Act<\/a> (CCPA)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on PKI Security Fundamentals<\/h2>\n\n\n\n<p>We hope that you\u2019ve found this article on PKI basics informative and useful. It\u2019s easy to see why PKI has been trusted as the foundation of internet security for decades. To learn more about various aspects of public key infrastructure, we invite you to go back and check out the resources embedded in the article.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Set your watch \u2014 we\u2019ll cover all the PKI basics you didn\u2019t know you didn\u2019t know in less time than it takes to make a good cup of coffee Have&#8230;<\/p>\n","protected":false},"author":8,"featured_media":3135,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[13,9],"tags":[54,280],"class_list":["post-3129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-encryption","tag-pki","tag-public-key-infrastructure","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PKI 101: All the PKI Basics You Need to Know in 180 Seconds - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"In a hurry? This article on PKI basics will break down what you need to know about the fundamentals of PKI to quickly get you on your way.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PKI 101: All the PKI Basics You Need to Know in 180 Seconds - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"In a hurry? This article on PKI basics will break down what you need to know about the fundamentals of PKI to quickly get you on your way.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-14T18:53:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-14T18:53:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-feature-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2027\" \/>\n\t<meta property=\"og:image:height\" content=\"1267\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"PKI 101: All the PKI Basics You Need to Know in 180 Seconds\",\"datePublished\":\"2023-02-14T18:53:15+00:00\",\"dateModified\":\"2023-02-14T18:53:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/\"},\"wordCount\":1319,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/pki-basics-feature-image.jpg\",\"keywords\":[\"pki\",\"public key infrastructure\"],\"articleSection\":[\"Cyber Security\",\"Encryption\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/\",\"name\":\"PKI 101: All the PKI Basics You Need to Know in 180 Seconds - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/pki-basics-feature-image.jpg\",\"datePublished\":\"2023-02-14T18:53:15+00:00\",\"dateModified\":\"2023-02-14T18:53:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"In a hurry? This article on PKI basics will break down what you need to know about the fundamentals of PKI to quickly get you on your way.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/pki-basics-feature-image.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/pki-basics-feature-image.jpg\",\"width\":2027,\"height\":1267,\"caption\":\"featured image for the article on PKI basics. It is a 3-column image that shows the three words illustrated with a graphic of a megaphone, key, and an infrastructure-like visualization\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PKI 101: All the PKI Basics You Need to Know in 180 Seconds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PKI 101: All the PKI Basics You Need to Know in 180 Seconds - InfoSec Insights","description":"In a hurry? This article on PKI basics will break down what you need to know about the fundamentals of PKI to quickly get you on your way.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/","og_locale":"en_US","og_type":"article","og_title":"PKI 101: All the PKI Basics You Need to Know in 180 Seconds - InfoSec Insights","og_description":"In a hurry? This article on PKI basics will break down what you need to know about the fundamentals of PKI to quickly get you on your way.","og_url":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/","og_site_name":"InfoSec Insights","article_published_time":"2023-02-14T18:53:15+00:00","article_modified_time":"2023-02-14T18:53:23+00:00","og_image":[{"width":2027,"height":1267,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-feature-image.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"PKI 101: All the PKI Basics You Need to Know in 180 Seconds","datePublished":"2023-02-14T18:53:15+00:00","dateModified":"2023-02-14T18:53:23+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/"},"wordCount":1319,"image":{"@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-feature-image.jpg","keywords":["pki","public key infrastructure"],"articleSection":["Cyber Security","Encryption"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/","url":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/","name":"PKI 101: All the PKI Basics You Need to Know in 180 Seconds - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-feature-image.jpg","datePublished":"2023-02-14T18:53:15+00:00","dateModified":"2023-02-14T18:53:23+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"In a hurry? This article on PKI basics will break down what you need to know about the fundamentals of PKI to quickly get you on your way.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-feature-image.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2023\/02\/pki-basics-feature-image.jpg","width":2027,"height":1267,"caption":"featured image for the article on PKI basics. It is a 3-column image that shows the three words illustrated with a graphic of a megaphone, key, and an infrastructure-like visualization"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"PKI 101: All the PKI Basics You Need to Know in 180 Seconds"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/3129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=3129"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/3129\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/3135"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=3129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=3129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=3129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}