Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern computing security systems. By associating a public key with a private key, many of the key distribution problems of earlier systems are avoided. The Internet public key infrastructure provides the secure digital certification required to establish a network of trust for public commerce. This paper explores the details of the infrastructure. P ublic key cryptography has emerged as a core technology and has been adopted in many modern computing security systems. The concept of related private and public key pairs is probably its most appealing aspect. The notion that one cryptographic operation-encryption-can be performed using one key from the pair, while the reverse transformation can only be computed using the other key in the pair, is indeed a giant step toward solving the secret key distribution problem. The proliferation of public cryptographic keys, on the other hand, needs to be achieved in a controlled fashion to ensure that public keys are securely bound to legitimate entities. The Internet public key infrastructure defines secure digital certification for public keys. This paper explores the details of this infrastructure. We begin with an overview of secret key cryptography; we then introduce the secret key distribution problem and explain how public key cryptography contributes to its resolution. Subsequently, we discuss the foundations of the Internet public key certification, the reasons it is needed, and its defining components.