« Home « Kết quả tìm kiếm

Hacker Professional part 186


Tóm tắt Xem thử

- 3 Key Management.
- 3.1 What key management issues are involved in public-key cryptography?.
- 3.4 Should a public key or private key be shared among users?.
- 3.8 What is a CSU, or, How do certifying authorities store their private keys?.
- 3.13 What happens if I lose my private key?.
- 3.14 What happens if my private key is compromised?.
- 3.15 How should I store my private key?.
- 3.16 How do I find someone else's public key?.
- 3.18 What is a digital time-stamping service?.
- 4.1 What is a one-way function?.
- 4.2 What is the significance of one-way functions for cryptography?.
- 4.3 What is the factoring problem?.
- 4.4 What is the significance of factoring in cryptography?.
- 4.8 What is the RSA Factoring Challenge?.
- 4.9 What is the discrete log problem?.
- 5.1 What is DES?.
- In practice, most attacks on public-key systems will probably be aimed at the key management levels, rather than at the cryptographic algorithm itself..
- If someone's private key is lost or compromised, others must be made aware of this, so that they will no longer encrypt messages under the invalid public key nor accept messages signed with the invalid private key..
- Although most of these key management issues arise in any public-key.
- Once generated, a user must register his or her public key with some central administration, called a certifying authority.
- The certifying authority returns to the user a certificate attesting to the veracity of the user's public key along with other information (see Questions 3.5 and following).
- because these numbers are small, the public-key operations (encryption and signature verification) are fast relative to the private key operations (decryption and signing).
- In public-key systems based on discrete logarithms, such as ElGamal, Diffie-Hellman, or DSS, it has often been suggested that a group of people should share a modulus.
- Certificates are digital documents attesting to the binding of a public key to an individual or other entity.
- They allow verification of the claim that a given public key does in fact belong to a given individual.
- In their simplest form, certificates contain a public key and a name.
- A certificate is issued by a certifying authority (see Question 3.7) and signed with the certifying authority's private key.

Xem thử không khả dụng, vui lòng xem tại trang nguồn
hoặc xem Tóm tắt