Management of secret/public keys

22 Outubro 2015, 11:00 Ricardo Chaves

Management of secret keys

Distribution of secret keys: with a trusted third party

Replay attacks

Needham-Schroeder


Management of public keys

Management of asymmetrical keys: Goals

Distribution of public keys:

 -Public directory