Public Key Infrastructure (PKI) uses public/private key cryptography and digital certificates to authenticate users and devices, encrypt and sign messages and documents. The document discusses how PKI works including the use of digital signatures to authenticate messages, the need for a trusted authority to issue certificates binding public keys to identities, and recommendations for implementing a basic PKI including documenting policies and procedures. Common cryptographic algorithms for encryption, signatures and hashing are also briefly described.