Public Key CryptosystemsLaRon Walker
Master of Information Technology and Internet Security
Public Key Cryptosystems can contain a combination of many different components.However one basic element necessary in creating any public key cryptosystem is a means topublicly distribute keys. This alone is essential in creating a public-key infrastructures (PKI),which the way to securely send messages over unsecure networks that use keys as means of authentication (Keston, 2009).-There many techniques to distribute keys, but most include usingpublic announcement of public keys, public key directories, public authorities, or public-keycertificates.The least secure of the above stated methods are is the public announcement of publickeys. In this method, the keys are publicly announced (Stallings, 2011). Due to this, keys can beeasily duplicated and issued falsely to other users masquerading as the sender of valid publickeys. A more secure method would be that of the use of public key directories. In this scenario,keys are dynamically distributed to its users, making it more difficult for the publicannouncement method of public key¶s vulnerability to occur. Although this strategy may seemsecure, it still possesses a major exploit. If the private key of a public-key directory iscompromised, the same vulnerability becomes available as that in the public announcementscenario, along with giving the ability to masquerade as any participant utilizing that public keydirectory. Using public authorities helps address this issue.