From the course: Learning Cryptography and Network Security

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Managing keys using PKI

Managing keys using PKI

From the course: Learning Cryptography and Network Security

Start my 1-month free trial

Managing keys using PKI

- [Instructor] An important concept we must address, while communicating with entities on the internet and dealing with public keys, is the issue of trust. There are two ways to address this trust, the Web of Trust and Certificates. Phil Zimmerman introduced the Web of Trust after developing Pretty Good Privacy. The mechanism is this, instead of using a trusted third party, such as Verisign, to decide on whether or not a public key can be trusted, we look to a trusted introducer. We'll use this example. You work in an accounting department, your manager tells everyone in your department, "We're now going to use GPG for email communications." Once the software is installed, everyone creates his or her own public key pair, which includes a public key and a private key. Everyone sends their public key to the manager. The manager will then assign trust. Now trust is assigned by one of the following ways. Unknown. Keys start…

Contents