This document discusses public key infrastructure (PKI) and its role in enabling electronic commerce. It covers traditional commerce versus e-commerce, security requirements and attacks for safe commerce, security services like encryption and authentication, and security mechanisms like digital signatures. It also provides details on cryptographic algorithms like symmetric, asymmetric, and hash algorithms. It describes how digital certificates, certification authorities, and hardware security modules help establish trust in e-commerce transactions.