• DISCUSSION OF DIFFERENT TYPES OF PUBLIC KEY INFRASTRUCTURE IN REAL LIFE
Abstract
Since public keys in asymmetric cryptosystems need not be kept secret, key management in those systems is simpler than in symmetric schemes. Private keys, however, must be kept secret. Also, public keys must be protected from falsification and abuse. Therefore, appropriate public-key infrastructures (PKI) must be set up. They are responsible for key distribution and management. In this paper, we describe how such public-key infrastructures work.
Keywords
Full Text:
PDFThis work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
© 2010-2022 International Journal of Mathematical Archive (IJMA) Copyright Agreement & Authorship Responsibility |