This document discusses public key infrastructures (PKI) and their components. It describes how PKI can enable secure communication, notarization, time-stamping, non-repudiation, and privilege management through the use of certificates, digital signatures, and trusted third parties. It also outlines some of the pitfalls of PKI, such as key compromises, difficulties with revocation, and human errors in certificate validation. Finally, it examines the technical details of how certificates, certification authorities, certificate paths, and trust models function within a PKI.