{"id":826,"date":"2020-04-07T10:56:00","date_gmt":"2020-04-07T10:56:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=826"},"modified":"2025-04-28T12:27:41","modified_gmt":"2025-04-28T12:27:41","slug":"what-is-pki-a-laymans-guide-to-public-key-infrastructure","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/","title":{"rendered":"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">If you\u2019ve wondered what public key infrastructure (PKI) is, you\u2019ve come to the right place. It\u2019s something that protects our money, privacy and so much more. The crazy part, most people don\u2019t even know what it is\u2026<\/h2>\n\n\n\n<p>So, you\u2019re finally ready to ask. You\u2019ve put this off, we\nknow. We understand, it\u2019s a big topic. It\u2019s okay though. We\u2019ll walk you through\nthis one. And before you know it, you\u2019ll be chatting with your friends at work\nand dropping knowledge when someone asks, \u201cWhat is PKI?\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Getting Straight to the Point: What Is PKI?<\/h2>\n\n\n\n<p>Before we dive into a deeper, more layered explanation, here is a quick definition of PKI: <strong>Public key infrastructure is something that establishes and manages public key encryption and digital signature services.<\/strong> For public key encryption to work, digital keys and certificates need to be created, stored, distributed, managed, revoked, used and so on. PKI allows for encryption to do all of these things with software, hardware, protocols, policies, processes and services. <\/p>\n\n\n\n<p>If you want a quick but still more detailed explanation, check out our article on <a href=\"https:\/\/sectigostore.com\/blog\/pki-101-all-the-pki-basics-you-need-to-know-in-180-seconds\/\">PKI basics<\/a>.<\/p>\n\n\n\n<p>If you want a deeper, more layered explanation of PKI, keep\non reading!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Answering \u201cWhat is Public Key Infrastructure?\u201d \u2014 A 100,000-Foot Perspective<\/h2>\n\n\n\n<p>Like we said, we get it, this topic is tough. Just so we\ndon\u2019t undermine the complexity of PKI, let\u2019s start with a riddle. What\u2019s\nsomething that no can see but helps other\u2019s see what can\u2019t be seen? You guessed\nit, PKI! <\/p>\n\n\n\n<p>In a way, that\u2019s quite the accurate description. Think of public\nkey infrastructure as the almighty helping hand. The helping hand is there for anything\nand everything. PKI is no different. It\u2019s there no matter what is asked of it. PKI\nis the helping hand that makes online banking, paying taxes online, shopping on\nAmazon and so much more safe and secure! It\u2019s there to help in anyway it can!<\/p>\n\n\n\n<p>It\u2019s a facilitator of sorts.<\/p>\n\n\n\n<p>Now, maybe that didn\u2019t help entirely (maybe we\u2019re not as\nhelpful as PKI), but let\u2019s bring you down from 100,000 feet to 50,000 feet. We\ncan do this with a little backstory about encryption, keys, and Julius Caesar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The PKI Flashback: The PKI Story Starts Almost 4,000 Years Ago<\/h2>\n\n\n\n<p>Yes, we\u2019re doing a flashback like Marty McFly. Or was it a\nflash forward? Hard to say when he\u2019s going BACK to the future\u2026 I digress.<\/p>\n\n\n\n<p>To truly understand PKI, you need to know some backstory.\nThere have been signs of encryption dating all the way back to 1900 BC. Maybe\nthe most famous example of encryption history is that of Caesar\u2019s Cipher around\n40-50 BC. Caesar used a sort of shift cipher that scrambled letters around by\njumping ahead a fixed number of places in the alphabet. This proved to be an\nexcellent tactic to protect his messages from enemies who have intercepted\nthem.&nbsp; <\/p>\n\n\n\n<p>This brings us to conventional (aka symmetric) encryption. Sticking\nwith what Caesar did \u2014 basically, he knew what the key was to decode his\nmessages, which means the person who was receiving the message needed to know\nwhat the key was as well. That\u2019s how conventional encryption works. <\/p>\n\n\n\n<p>Here\u2019s another example of conventional encryption. Let\u2019s say\nDaffy Duck and Yosemite Sam didn\u2019t want Bugs Bunny to know they\u2019re working\ntogether. How could they pass secret messages without letting Bugs find out?\nThere would need to be a way to encrypt messages and a key to decrypt them, but\nthe problem Daffy and Yosemite would run into is that they\u2019d need to a way to\npass the key. They can\u2019t meet in person because that would ruin their plan of\nsecrecy. They also couldn\u2019t pass the key with the message because that would\nalso make this process utterly useless.<\/p>\n\n\n\n<p>Looks like Bugs got them again. The problem Daffy and\nYosemite face is figuring out how two people in different places can agree on\nan encryption key to exchange encrypted messages. Now, if Daffy and Yosemite\nhad PKI at their disposal, then they just might be able to pull one off this\ntime.&nbsp; <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">To Answer, \u201cWhat is PKI?\u201d You Need to Understand Public Key Encryption<\/h2>\n\n\n\n<p>As opposed to conventional encryption, which uses one key, PKI enables what we call <a href=\"https:\/\/www.thesslstore.com\/blog\/difference-encryption-hashing-salting\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">public key encryption<\/a> (aka asymmetric encryption) to be able to use two keys. One key encrypts while the other decrypts. The two keys used are the public key and the private key. The keys are aptly named as one key is available to the public and the other one is private. <\/p>\n\n\n\n<p>Using the public key encryption method, Daffy could encrypt\nhis message using Yosemite\u2019s public key. That way, only the person with the\nprivate key (Yosemite) could decrypt the message. Even if it was intercepted,\nBugs couldn\u2019t get anything valuable out of the message because the ciphertext\nwould look like gibberish without the decryption key. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"752\" height=\"310\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/what-is-pki-breakdown-1.png\" alt=\"\" class=\"wp-image-839 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/what-is-pki-breakdown-1.png 752w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/what-is-pki-breakdown-1-300x124.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/what-is-pki-breakdown-1-560x231.png 560w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/figure><\/div>\n\n\n\n<p>An impressive method for sure. Maybe the only thing more\nimpressive is that I somehow turned Bugs Bunny into a hacker. <\/p>\n\n\n\n<p>Now take this concept and apply it to two computers trying\nto communicate securely. With PKI, these two computers can basically speak to\neach other, agree, share keys and ultimately decrypt the message that was in\ntransit. <\/p>\n\n\n\n<p>So, I think that covers PKI from the 50,000-foot perspective.\nWe\u2019re going to bring you to about 10,000 feet for the rest of the way through,\nwhich will leave you with a thorough understanding of PKI, and ultimately\nanswer the question \u201cwhat is PKI?\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Are the Key Players Involved in PKI?<\/h2>\n\n\n\n<p>There are three main elements to PKI:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>The key pair<\/strong>, which we just covered is one of them. <\/li>\n\n\n\n<li><strong>Certificate authorities (CAs)<\/strong> are another. CAs are trusted third-party bodies that develop and manage digital certificates. Trusted is the key word there as CAs hold the prestigious honor of being trusted to issue certificates by meeting ultra-strict criteria established by the <a href=\"https:\/\/cabforum.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">CA\/Browser Forum<\/a> (CA\/B Forum), an independent group largely made up of representatives from the world\u2019s largest browsers.<\/li>\n\n\n\n<li><strong>Digital certificates<\/strong>, which are created by the CAs, are the final element. A digital certificate acts as the passports of PKI. Just as you need a passport to travel internationally, you need a digital certificate to travel through PKI. That\u2019s because a PKI digital certificate carries documentation that details information about the key and its owner. It also comes with a signature from the CA, similar to a passport coming with a signoff from the traveler\u2019s government. &nbsp;<\/li>\n<\/ol>\n\n\n\n<p>These three elements (or \u201cplayers,\u201d as the title says) make\nup the inner workings of this infrastructure. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Five Ways That PKI Helps Us in Our Everyday Lives<\/h2>\n\n\n\n<p>As we said in the opener, PKI is something that protects our\nmoney, privacy, and so much more. It touches our lives nearly every day. So,\nhow does this invisible infrastructure help so many people? It facilitates and\nsupports safety and security in nearly every facet of digital communications. <\/p>\n\n\n\n<p>Here are five specific areas PKI does this:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Web Security <\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"956\" height=\"410\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/website-security-padlock-pki.png\" alt=\"\" class=\"wp-image-828 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/website-security-padlock-pki.png 956w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/website-security-padlock-pki-300x129.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/website-security-padlock-pki-560x240.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/website-security-padlock-pki-940x403.png 940w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/figure><\/div>\n\n\n\n<p>In today\u2019s digital world, it\u2019s vital we are able to interact with websites without having our interactions recorded or intercepted. PKI allows for <a href=\"https:\/\/sectigostore.com\/blog\/how-to-tell-if-a-website-is-legit-in-10-easy-steps\/\">HTTPS<\/a> to happen. The secure HTTPS protocol allows for browsers and web servers (aka websites) to safely and securely communicate. To have an HTTPS website, you need an <a href=\"https:\/\/sectigostore.com\/ssl-certificates\">SSL\/TLS certificate<\/a>. <\/p>\n\n\n\n<p>By <a href=\"https:\/\/sectigostore.com\/blog\/ssl-for-wordpress\/\">installing an SSL certificate on your website<\/a>, you receive the aforementioned public and private key pair. The private key is securely housed in the web server, so that a user\u2019s browser can identity a website (server) as legitimate. This allows for users to safely shop, submit personal information, and pay while browsing websites. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email Security <\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"391\" height=\"349\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/secure-email-digital-signature-pki.png\" alt=\"\" class=\"wp-image-830 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/secure-email-digital-signature-pki.png 391w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/secure-email-digital-signature-pki-300x268.png 300w\" sizes=\"auto, (max-width: 391px) 100vw, 391px\" \/><\/figure><\/div>\n\n\n\n<p>Email is another key area that PKI touches. PKI provides the framework for emails to safely travel from one person to another. This process is known as <a href=\"https:\/\/www.thesslstore.com\/blog\/what-you-need-to-know-about-s-mime\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"secure\/multipurpose internet mail extension (S\/MIME (opens in a new tab)\">secure\/multipurpose internet mail extension (S\/MIME<\/a>). <a href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">S\/MIME certificates<\/a> are used to encrypt the email message and digitally sign it, so that the sender and their message can be authenticated. This also helps to prevent bad guys from tampering with emails. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a>Secure Messaging <\/a><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"691\" height=\"396\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/secure-communications-pki.png\" alt=\"\" class=\"wp-image-829 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/secure-communications-pki.png 691w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/secure-communications-pki-300x172.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/secure-communications-pki-560x321.png 560w\" sizes=\"auto, (max-width: 691px) 100vw, 691px\" \/><\/figure><\/div>\n\n\n\n<p>Imagine getting on\nWhatsApp and feeling like you can\u2019t send a message to your friends without\nsomeone intercepting and reading it. It\u2019s a scary thought. PKI makes it more\nsecure to use messaging services like WhatsApp with the use of encryption. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Code\/App Signing <\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"456\" height=\"336\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/code-signing-certificate-popup.png\" alt=\"\" class=\"wp-image-833 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/code-signing-certificate-popup.png 456w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/code-signing-certificate-popup-300x221.png 300w\" sizes=\"auto, (max-width: 456px) 100vw, 456px\" \/><\/figure><\/div>\n\n\n\n<p>So, PKI covers secure website communications, email and\nmessaging. What else does it cover? Well, let\u2019s say you download an app or\nsoftware, and once you download it, it asks for you to make an account, put\nyour credit card number on there to buy additional services and for more\nprivate information. But how can you trust this? By software developers and\npublishers using code signing certificates, that\u2019s how!<\/p>\n\n\n\n<p>These certificates ensure the developer\/publisher of the\nfile is who they say they are. <a href=\"https:\/\/sectigostore.com\/blog\/what-is-an-x-509-certificate-what-to-know-about-pki-certificates\/\">PKI enables the code signing certificates<\/a> to\nauthenticate who the publisher is using public key encryption. It also helps to\nprevent tampering once the software or application is signed. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a>Document Signing <\/a><\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"804\" height=\"369\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/document-signing-screenshot.png\" alt=\"\" class=\"wp-image-834 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/document-signing-screenshot.png 804w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/document-signing-screenshot-300x138.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/document-signing-screenshot-560x257.png 560w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/figure><\/div>\n\n\n\n<p>In today\u2019s digital world, it would be completely inefficient to physically sign every document that requires you to do so. That is what brings us to document signing. PKI enables users to electronically sign documents with the ability to prove to the receiver that the signed document is coming from a legitimate source. This happens with <a href=\"https:\/\/sectigostore.com\/id\/document-signing-certificate\">document signing certificates<\/a>. And PKI isn\u2019t just offering a secure way to digitally sign documents, it\u2019s also saving you from a lot of hand cramps.&nbsp; <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Final Answer to the Question \u201cWhat is PKI?\u201d<\/h2>\n\n\n\n<p>From Bugs Bunny to Marty McFly and Julius Caesar to HTTPS,\nwe\u2019ve reached the end of our story. PKI is so much more than a software or\nproduct. PKI is a fully functional <em>everything<\/em> that allows for all of us\nto safely and securely operate in the digital world. With encryption and\nauthentication, it governs this world allowing messages to travel, documents\nand downloads to be trusted and above all us, PKI allows us to enjoy the\nbeautiful world behind our computer screen.<\/p>\n\n\n\n<p>For something so largely unknown, it\u2019s a pretty remarkable\nthing. So, next time someone asks, \u201cwhat is PKI,\u201d make sure you don\u2019t skip a\nsingle \u201ckey\u201d detail.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve wondered what public key infrastructure (PKI) is, you\u2019ve come to the right place. It\u2019s something that protects our money, privacy and so much more. The crazy part, most&#8230;<\/p>\n","protected":false},"author":14,"featured_media":838,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9],"tags":[54,53],"class_list":["post-826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-encryption","tag-pki","tag-public-key-encryption","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Not sure &quot;what is PKI?&quot; It&#039;s everything relating to the management and use of public key encryption (digital certificates, policies, procedures, tech, etc.)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Not sure &quot;what is PKI?&quot; It&#039;s everything relating to the management and use of public key encryption (digital certificates, policies, procedures, tech, etc.)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-07T10:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T12:27:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Danny Lewis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Danny Lewis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/\"},\"author\":{\"name\":\"Danny Lewis\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/25502b599fb00be7291f8a162d0d7267\"},\"headline\":\"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure\",\"datePublished\":\"2020-04-07T10:56:00+00:00\",\"dateModified\":\"2025-04-28T12:27:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/\"},\"wordCount\":1760,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/1.png\",\"keywords\":[\"pki\",\"public key encryption\"],\"articleSection\":[\"Cyber Security\",\"Encryption\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/\",\"name\":\"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/1.png\",\"datePublished\":\"2020-04-07T10:56:00+00:00\",\"dateModified\":\"2025-04-28T12:27:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/25502b599fb00be7291f8a162d0d7267\"},\"description\":\"Not sure \\\"what is PKI?\\\" It's everything relating to the management and use of public key encryption (digital certificates, policies, procedures, tech, etc.)\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/1.png\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/1.png\",\"width\":1600,\"height\":1000,\"caption\":\"Graphic representing public key infrastructure and encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/25502b599fb00be7291f8a162d0d7267\",\"name\":\"Danny Lewis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g\",\"caption\":\"Danny Lewis\"},\"description\":\"Danny is a writer and editor with a background in journalism, marketing and communications. He is a tech enthusiast and writes about technology, website security and cyber security.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure - InfoSec Insights","description":"Not sure \"what is PKI?\" It's everything relating to the management and use of public key encryption (digital certificates, policies, procedures, tech, etc.)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure - InfoSec Insights","og_description":"Not sure \"what is PKI?\" It's everything relating to the management and use of public key encryption (digital certificates, policies, procedures, tech, etc.)","og_url":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/","og_site_name":"InfoSec Insights","article_published_time":"2020-04-07T10:56:00+00:00","article_modified_time":"2025-04-28T12:27:41+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/1.png","type":"image\/png"}],"author":"Danny Lewis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Danny Lewis","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/"},"author":{"name":"Danny Lewis","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/25502b599fb00be7291f8a162d0d7267"},"headline":"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure","datePublished":"2020-04-07T10:56:00+00:00","dateModified":"2025-04-28T12:27:41+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/"},"wordCount":1760,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/1.png","keywords":["pki","public key encryption"],"articleSection":["Cyber Security","Encryption"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/","url":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/","name":"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/1.png","datePublished":"2020-04-07T10:56:00+00:00","dateModified":"2025-04-28T12:27:41+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/25502b599fb00be7291f8a162d0d7267"},"description":"Not sure \"what is PKI?\" It's everything relating to the management and use of public key encryption (digital certificates, policies, procedures, tech, etc.)","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/1.png","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/04\/1.png","width":1600,"height":1000,"caption":"Graphic representing public key infrastructure and encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-pki-a-laymans-guide-to-public-key-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is PKI? A Layman\u2019s Guide to Public Key Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/25502b599fb00be7291f8a162d0d7267","name":"Danny Lewis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g","caption":"Danny Lewis"},"description":"Danny is a writer and editor with a background in journalism, marketing and communications. He is a tech enthusiast and writes about technology, website security and cyber security."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=826"}],"version-history":[{"count":6,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/826\/revisions"}],"predecessor-version":[{"id":3137,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/826\/revisions\/3137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/838"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}