university:anna university
year:4th
sem:07
subject code:EC2035
subject:cryptography and network security
content:EC2035-cryptography and network security-lecture notes for unit 2-edition 2014
KEY MANAGEMENT
Public-key encryption helps address key distribution problems
Have two aspects of this:
Distribution of Public keys can be considered as using one of:
public announcement
publicly available directory
public-key authority
public-key certificates
a. Public Announcement
Users distribute public keys to recipients or broadcast to community at large
eg. append PGP keys to email messages or post to news groups or email list
Major weakness is forgery
Anyone can create a key claiming to be someone else and broadcast it
until forgery is discovered can masquerade as claimed user
For More, Attachment the Attachment
Attachment link:
unit-2 peri.pdf (Size: 362.91 KB / Downloads: 904)
year:4th
sem:07
subject code:EC2035
subject:cryptography and network security
content:EC2035-cryptography and network security-lecture notes for unit 2-edition 2014
KEY MANAGEMENT
Public-key encryption helps address key distribution problems
Have two aspects of this:
- Distribution of public keys
- Use of public-key encryption to distribute secret keys
Distribution of Public keys can be considered as using one of:
public announcement
publicly available directory
public-key authority
public-key certificates
a. Public Announcement
Users distribute public keys to recipients or broadcast to community at large
eg. append PGP keys to email messages or post to news groups or email list
Major weakness is forgery
Anyone can create a key claiming to be someone else and broadcast it
until forgery is discovered can masquerade as claimed user
For More, Attachment the Attachment
Attachment link:
unit-2 peri.pdf (Size: 362.91 KB / Downloads: 904)