Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
LaRon Walker - Public Key Cryptosystems

LaRon Walker - Public Key Cryptosystems

Ratings: (0)|Views: 15|Likes:
Published by LaRon Walker
Public Key Cryptosystems
Public Key Cryptosystems

More info:

Published by: LaRon Walker on Apr 05, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





Public Key CryptosystemsLaRon Walker
Master of Information Technology and Internet Security
 May, 2010
Public Key Cryptosystems can contain a combination of many different components.However one basic element necessary in creating any public key cryptosystem is a means topublicly distribute keys. This alone is essential in creating a public-key infrastructures (PKI),which the way to securely send messages over unsecure networks that use keys as means of authentication (Keston, 2009).-There many techniques to distribute keys, but most include usingpublic announcement of public keys, public key directories, public authorities, or public-keycertificates.The least secure of the above stated methods are is the public announcement of publickeys. In this method, the keys are publicly announced (Stallings, 2011). Due to this, keys can beeasily duplicated and issued falsely to other users masquerading as the sender of valid publickeys. A more secure method would be that of the use of public key directories. In this scenario,keys are dynamically distributed to its users, making it more difficult for the publicannouncement method of public key¶s vulnerability to occur. Although this strategy may seemsecure, it still possesses a major exploit. If the private key of a public-key directory iscompromised, the same vulnerability becomes available as that in the public announcementscenario, along with giving the ability to masquerade as any participant utilizing that public keydirectory. Using public authorities helps address this issue.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->