SLIDE 68 ITS335 Cryptography Encrypt for Confidentiality Symmetric Key Authentication Public Key Key Management Signatures Random Numbers Summary
68/86
Distributing Public Keys
◮ By design, public keys are made public ◮ Issue: how to ensure public key of A actually belongs to
A (and not someone pretending to be A)
◮ Approaches for public key distribution
- 1. Public announcement (web page, email, newspaper)
- 2. Publish in electronic directory (which manually
authenticates users)
◮ Users manually publish key at authority, and gain
authorities public key
◮ Users automatically request other users public keys
from authority
- 4. Public key certificates
◮ Users manually register with authority ◮ Authority issues certificates to users: users public key
signed by authority
◮ Users automatically exchange certificates