Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
LaRon Walker - Public Key Directories and Certificates

LaRon Walker - Public Key Directories and Certificates

Ratings: (0)|Views: 12 |Likes:
Published by LaRon Walker
Public Key Directories and Certificates
Public Key Directories and Certificates

More info:

Published by: LaRon Walker on Apr 05, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





Running Head: Public Key Directories and Certificates 1
Public Key Directories and CertificatesLaRon WalkerMaster of Information Technology and Internet SecurityMay, 2010
Due to the amount of information being transmitted over the Internet, having secure and reliablemeans of sending and receiving messages is essential. Message encryption has become moreand more of a concern for consumers and corporations alike. Implementing encryption can beapproached in a number of ways, each possessing their own benefits and drawbacks. Public keydistribution is one way to approach this need. Public key distribution plays a vital role whendeveloping a public key infrastructure (PKI). . Using public key directories and public keycertificates are two methods to distribute encryption keys securely amongst message senders andrecipients. Both of these techniques encompass their individual strengths and weaknesseshowever are the more commonly key distribution techniques used in today¶s digital world.
Public Key Directories and CertificatesLaRon WalkerMaster of Information Technology and Internet SecurityMay, 2010
To help ensure messages securely reach their destinations you must consider implementing a message encryption strategy. A public key infrastructure (PKI) can helpaccomplish this task. A PKI is a system for securing transactions over insecure networks (suchas the Internet) that entails the use of unique identifying keys for authentication (Keston, 2009).Along with this system, you must also consider how these keys will be distributed to itsparticipants.There are many different techniques that can be used to distribute public keys. A few of these methods include, but are not limited to public key directories, public key authorities, andpublic-key certificates. Each of these methods can be applied to a PKI, however to be effective,the distribution of encryption keys must be controlled and monitored. The more commonly usedmethods to distribute public encryption keys are by way of public key directories and public-keycertificates.When using public key directories to distribute encryption keys, a publicly available keydirectory distributes keys dynamically to its users, which is controlled and maintained by atrusted authority (Stallings, 2011). Distributing these encryption keys dynamically makes themmore difficult for outsiders to guess as well as keep them changing in the event a public key iscompromised. There are four specific criteria that must be met for a public key directory toexist. These components are as follows:

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->