CAB240 Lecture Notes - Lecture 10: Public-Key Cryptography, Symmetric-Key Algorithm, Key Distribution

177 views5 pages
23 Oct 2018
School
Course

Document Summary

Symmetric cipher uses the same key to encrypt and decrypt, leaving the problem of safely and securely distributing keys amongst the users. This can be done a number of ways (covered in the previous lecture: distribute out-of-band, diffie-hellman agreement, trusted third party (ttp, these aren"t always appropriate or viable in some online situations (e. g. banking) There is also a browser trust model that details how your browser decides which pks to trust. Public keys can be distributed by key servers and value verified by fingerprints: each user, has a key ring containing public keys of other users they trust, may sign public keys that they trust, e. g. The ca is vouching for the information in the certificate: a digital certificate contains, the user"s pk, the user"s id, other information (e. g. validity period) Digital certificates and trust: most widely used format for digitate certs: x. 509 standard, recommended by international telecommunication union (itu-t)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents