lec-9 - CSE565: Computer Security Lectures 9 & 10 Key...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
1 09/29/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 9.1 CSE565: Computer Security Key Management Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260 09/29/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 9.2 Acknowledgments Material for some slides is drawn from Lawrie Brown’s slides
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 09/29/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 9.3 Key Management Public-key encryption helps address key distribution problems Have two aspects of this: distribution of public keys use of public-key encryption to distribute secret keys 09/29/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 9.4 Distribution of Public Keys Can be considered as using one of: Public announcement Publicly available directory Public-key authority Public-key certificates
Background image of page 2
3 09/29/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 9.5 Public Announcement Users distribute public keys to recipients or broadcast to community at large e.g., append PGP keys to email messages or post to news groups or email list Major weakness is forgery anyone can create a key claiming to be someone else and broadcast it until forgery is discovered can masquerade as claimed user 09/29/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 9.6 Publicly Available Directory Can obtain greater security by registering keys with a public directory Directory must be trusted with properties: contains {name, public-key} entries participants register securely with directory participants can replace key at any time directory is periodically published directory can be accessed electronically Still vulnerable to tampering or forgery
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 09/29/09 UB Fall 2009 CSE565: S. Upadhyaya Lec 9.7 Public-Key Authority Improve security by tightening control over distribution of keys from directory Has properties of directory Requires users to know public key for the
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 09/17/2010.

Page1 / 12

lec-9 - CSE565: Computer Security Lectures 9 & 10 Key...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online