Differences between revisions 1 and 2
Revision 1 as of 2005-11-02 00:39:27
Size: 664
Editor: yakko
Comment:
Revision 2 as of 2005-11-02 00:52:34
Size: 1760
Editor: yakko
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
'''2. List four general categories of scheemes for the distribution of public keys.'''    * The distribution of public keys
   * The use of public-key encryption to distribute secret keys.

'''2. List four general categories of schemes for the distribution of public keys.'''

   * Public announcement: Essentially you publish your public key yourself and people find it in the "wild" as it were and trust that it is really yours.
   * Publicly available directory: Maintained by some trusted entity
   * Public-key Authority: Requests are made to the Athority and it sends a private key encrypted response containing the requested key. Thus we know that the key came from the authority. But this becomes the bottleneck of the system.
   * Public-key Certificates:
Line 9: Line 17:
   1. The directory authority maintains a {name, public-key}
   1. Participants register a public key with the directory authority in person or through some secure authenticated communication.
   1. Participants may replace their public key at any time.
   1. Periodically the authority publishes the entire directory or updates to it. (With the net this is no longer an issue.)
   1. Participants may access the directory electroniclly via a secure authenticated communication.
   
Line 10: Line 25:

Review Questions

1. What are two different uses of public-key cryptography related to key distribution?

  • The distribution of public keys
  • The use of public-key encryption to distribute secret keys.

2. List four general categories of schemes for the distribution of public keys.

  • Public announcement: Essentially you publish your public key yourself and people find it in the "wild" as it were and trust that it is really yours.
  • Publicly available directory: Maintained by some trusted entity
  • Public-key Authority: Requests are made to the Athority and it sends a private key encrypted response containing the requested key. Thus we know that the key came from the authority. But this becomes the bottleneck of the system.
  • Public-key Certificates:

3. What are the essential ingredientes of a public-key directory?

  1. The directory authority maintains a {name, public-key}
  2. Participants register a public key with the directory authority in person or through some secure authenticated communication.
  3. Participants may replace their public key at any time.
  4. Periodically the authority publishes the entire directory or updates to it. (With the net this is no longer an issue.)
  5. Participants may access the directory electroniclly via a secure authenticated communication.

4. What is a public-key certificate?

5. What are the requirements for the use of a public-key certificate scheme?

6. Briefly explain Diffie-Hellman key exchange.

7. What is an elliptic curve?

8. What is the zero point of an elliptic curve?

9. What is the sum of three points on an elliptic curve that lie on a straight line?

Csce877Ch10Notes (last edited 2020-01-23 22:59:10 by scot)