What Is Public Key Infrastructure (PKI)?
Public key infrastructure (PKI) is the system used to create and manage public keys for encryption, which is a process used to secure online data exchange. It’s typically built into public web browsers that most people use.
“That little lock icon means your browser verified the website’s certificate and then used key pairs to create a secure, encrypted connection. It’s a great example of PKI doing exactly what it’s meant to do — quietly establishing trust in the background,” Fleck says.
PKI relies on two core technologies: public/private key pairs and the digital certificates linked to them. “The key pairs provide the ability to encrypt and decrypt data, while the digital certificates prove the identity of the person or system that holds the keys,” he says.
He adds that while it may seem arcane, PKI is foundational to every digital interaction, and small businesses should understand PKI as the “quiet trust” behind online transactions, communications, documentation signing and other digital interactions.
“As leaders, they should check that their teams have the skills and resources they need to manage PKI efficiently, without creating security or operational risks. Because when PKI breaks, it does not break silently. It often causes outages and security warnings, at best,” Fleck says.
LEARN MORE: What’s the minimum viable cybersecurity setup for an SMB with limited cash flow?
How Public and Private Keys Work Together to Protect Data
In public-private key pairs, the public key can be shared freely while the private key is kept secret. Data encrypted with one key can only be decrypted with the other.
Fleck shares this classic example: Bob can encrypt data using Alice’s public key but only Alice can decrypt it using her private key. “It’s the ability for people or systems that don’t ‘know’ each other to encrypt information without sharing their secret keys that makes public-private key pairs so powerful,” he adds.
But how can Bob be sure that he’s really dealing with Alice? That’s where digital certificates can assure trust. “A certificate links a public key to a real person, business or device and is issued by a trusted authority. In other words, the certificate answers the question, ‘Who does this public key actually belong to?’ Without certificates, you might have encryption but no reliable way to know that the person of machine on the other end is authentic,” Fleck says.
Click the banner below to discover how partners help small businesses succeed.
