PKI

The use of asymmetric cryptographic keys by a principal allows the principal to achieve properties like; authentication, confidentiality, non-repudiation, in distributed setups. Furthermore, composing asymmetric keys in the form of digital certificates fortifies the process of principal authentication. These keys are subjected to change due to various reasons, so the corresponding digital certificates. To reflect this change effectively, there exists a practice of maintaining an infrastructure which is called Public Key Infrastructure ‒ PKI.