Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 144 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Public Key Infrastructure (PKI) is a comprehensive system of roles, policies, hardware, software, and procedures for creating, managing, distributing, using, storing, and revoking digital certificates and managing public-key encryption through hierarchical certificate authorities.
Public Key Infrastructure (PKI) represents the traditional approach to establishing trust in digital communications through a hierarchical system of trusted third parties called Certificate Authorities (CAs). At its core, PKI binds public keys to entities (individuals, organizations, devices) through digitally signed certificates, creating a chain of trust from root CAs down to end-entity certificates.
The fundamental components of PKI include:
PKI enables three core security functions:
The scope of PKI extends across internet security (TLS/SSL), email encryption (S/MIME), code signing, document signing, and authentication systems. However, PKI's boundaries are defined by its reliance on administrative trust hierarchies and centralized certificate authorities.
PKI emerged in the 1970s-1980s alongside the development of public-key cryptography by Diffie, Hellman, Rivest, Shamir, and Adleman. The X.509 standard, published in 1988, formalized the certificate format that became the foundation of modern PKI.
Trust Model:
Key Rotation:
Verification:
Compromise Detection:
Infrastructure Dependency:
Organizations transitioning from PKI to KERI should consider:
KERI's cryptographic root-of-trust provides stronger security guarantees than PKI's administrative trust:
However, KERI requires proper witness/watcher infrastructure and secure key management practices to realize these benefits.
Traditional PKI implementations face several fundamental challenges:
Administrative Trust Basis: PKI relies on trusted third-party administrative processes rather than pure cryptographic verification. Organizations must trust that CAs properly verify identities before issuing certificates.
Single Points of Failure: Compromise of a CA's private key can undermine the entire trust chain. The 2011 DigiNotar breach demonstrated this vulnerability when attackers obtained fraudulent certificates for major domains.
Key Rotation Problem: PKI's most critical flaw is insecure key rotation. When rotating keys, the chain of trust breaks because the new key cannot be cryptographically verified against the old key. This creates vulnerability windows during rotation events.
DNS/BGP Vulnerabilities: PKI depends on DNS for domain validation, making it vulnerable to DNS hijacking and BGP hijacking attacks where attackers can obtain valid certificates for compromised domains.
Platform Lock-in: Traditional PKI creates segmented trust domains that don't span applications, resulting in what KERI documentation calls "platform-locked trust" where each service maintains separate certificate hierarchies.
Certificate Transparency: The need for Certificate Transparency (CT) logs—mandatory since 2021—reveals PKI's inherent opacity problem. CT provides public, append-only logs of certificates to detect mistakenly or maliciously issued certificates, but this represents a bolt-on solution to fundamental architectural issues.
KERI fundamentally reimagines the trust model by replacing PKI's administrative trust basis with a cryptographic root-of-trust based on self-certifying identifiers. This represents a paradigm shift from "trust the authority" to "verify the cryptography."
Where PKI uses certificates issued by trusted authorities to bind keys to identities, KERI uses Autonomic Identifiers (AIDs) that are cryptographically derived from their controlling keys. The identifier itself contains or is derived from the public key, eliminating the need for external certification.
KERI identifiers include derivation codes that specify the cryptographic algorithm used, making them self-describing. For example:
BF5pxRJP6THrUtlDdhh07hJEDKrJxkcR9m5u1xs33bhp
The leading 'B' indicates the derivation algorithm, while the remaining characters encode the public key material.
KERI's most significant innovation addressing PKI limitations is pre-rotation. In PKI, key rotation breaks the trust chain because there's no cryptographic link between old and new keys. KERI solves this through cryptographic commitments:
Pre-rotation provides post-quantum security because the next key remains hidden (only its digest is public) until rotation occurs. Even if quantum computers break current signing algorithms, they cannot forge the pre-committed rotation keys.
PKI uses certificate chains validated through hierarchical CAs. KERI uses Key Event Logs (KELs)—append-only, cryptographically chained logs of all key management events for an identifier:
KELs are portable verifiable data structures that don't depend on any specific infrastructure. Unlike PKI certificates that require CA infrastructure for validation, KELs can be verified by anyone with access to the log.
PKI handles key compromise through Certificate Revocation Lists (CRLs) or Online Certificate Status Protocol (OCSP), both requiring real-time queries to centralized services. KERI uses duplicity detection:
This approach makes compromise evident rather than requiring revocation infrastructure.
PKI's hierarchical model concentrates trust in root CAs. KERI distributes trust through:
This architecture eliminates single points of failure while maintaining verifiability.
PKI requires trusting the CA infrastructure for certificate validation. KERI provides end-verifiability—any party can cryptographically verify the entire chain of control from inception to current state without trusting intermediaries. The KEL itself contains all necessary proof.
IoT Device Identity: PKI certificates require renewal and revocation infrastructure. KERI identifiers persist through key rotations without external dependencies, ideal for resource-constrained devices.
Supply Chain Provenance: PKI certificates expire and require renewal. KERI's persistent identifiers with verifiable key history enable long-term provenance tracking without certificate lifecycle management.
Organizational Hierarchies: PKI's rigid certificate chains don't support flexible delegation. KERI's cooperative delegation enables hierarchical key management with cryptographic recovery—higher-level keys can rotate out compromised lower-level keys.
Cross-Domain Trust: PKI creates siloed trust domains. KERI's trust spanning layer enables identifiers to work across platforms without platform-specific certificate infrastructure.
No Certificate Authorities Required: Eliminates dependency on trusted third parties and their associated costs, vulnerabilities, and operational overhead
Secure Key Rotation: Pre-rotation provides cryptographically verifiable key rotation without breaking the trust chain
Portability: Identifiers and their verification proofs are self-contained, enabling true identifier portability across systems
Post-Quantum Resistance: Pre-rotation's cryptographic hiding of next keys provides quantum-safe key management
Ambient Verifiability: Anyone can verify identifier control without special infrastructure access
No Expiration: Identifiers persist indefinitely through key rotations without renewal requirements
Duplicity Evidence: Compromise attempts create detectable inconsistencies rather than requiring revocation infrastructure
Complexity: KERI's event-based architecture requires understanding key event logs, witnesses, watchers, and duplicity detection—concepts unfamiliar to PKI practitioners.
Infrastructure Requirements: While eliminating CAs, KERI requires witness and watcher infrastructure. However, these components are replaceable and don't require the same trust as CAs.
Adoption Barriers: Existing systems built on PKI require significant architectural changes to adopt KERI. The did:webs method provides a bridge by combining KERI security with web-based discovery.
Human-Meaningful Identifiers: KERI identifiers are cryptographic strings, not human-readable names. The aid|lid couplet model addresses this by securing human-meaningful identifiers within KERI trust domains.
Witness Coordination: Multi-signature identifiers require coordinating multiple witnesses for key events, adding operational complexity compared to single-CA certificate issuance.
Hybrid Deployments: Organizations can use KERI for high-security identifiers while maintaining PKI for legacy systems. The vLEI (verifiable Legal Entity Identifier) demonstrates this by using KERI to secure Legal Entity Identifiers traditionally managed through administrative processes.
PKI Replacement: New systems can adopt KERI directly, avoiding PKI's architectural limitations. The GLEIF vLEI ecosystem shows enterprise-scale KERI deployment for organizational identity.
Certificate Anchoring: KERI KELs can be anchored to blockchain or other ledgers for additional verification paths, though this is optional rather than required.
KERI's event-based architecture enables:
These properties make KERI suitable for high-throughput applications where PKI's real-time OCSP queries create bottlenecks.
PKI represents the traditional approach to digital trust through hierarchical certificate authorities and administrative processes. KERI reimagines this model by replacing administrative trust with cryptographic verification, hierarchical CAs with distributed witnesses, and certificate chains with verifiable event logs. While PKI remains deeply embedded in internet infrastructure, KERI provides a path toward truly decentralized, cryptographically verifiable identity systems that eliminate single points of failure and enable secure key rotation—addressing PKI's most fundamental limitations.