Unit-4 Remaining
Unit-4 Remaining
Unit-4 Remaining
2. Publicly Available Directory: In this type, the public key is stored in a public
directory. Directories are trusted here, with properties like Participant Registration,
access and allow to modify values at any time, contains entries like {name, public-
key}. Directories can be accessed electronically still vulnerable to forgery or
tampering.
3. Public Key Authority: It is similar to the directory but, improves security by
tightening control over the distribution of keys from the directory. It requires users
to know the public key for the directory. Whenever the keys are needed, real-time
access to the directory is made by the user to obtain any desired public key
securely.
4. Public Certification: This time authority provides a certificate (which binds an
identity to the public key) to allow key exchange without real-time access to the
public authority each time. The certificate is accompanied by some other info such
as period of validity, rights of use, etc. All of this content is signed by the private
key of the certificate authority and it can be verified by anyone possessing the
authority’s public key.
First sender and receiver both request CA for a certificate which contains a public
key and other information and then they can exchange these certificates and can
start communication.