This report explores the standards, implementation, and security of Public Key Infrastructure (PKI) and its applications. It discusses the available standards for PKI, the implementation of PKI in browsers, and the security considerations. It also presents a real-life scenario of breaking PKI with a commonly used browser. The report concludes with the need for improvement in PKI and its authentication process.