22:
180:
algorithms do not evade the problem either. That a public key can be known by all without compromising the security of an encryption algorithm (for some such algorithms, though not for all) is certainly useful, but does not prevent some kinds of attacks. For example, a spoofing attack in which public
124:
is used to solve the problem of authenticating the keys of a person (say "person A") that some other person ("person B") is talking to or trying to talk to. In other words, it is the process of assuring that the key of "person A", held by "person B", does in fact belong to "person A" and vice versa.
131:
The simplest solution for this kind of problem is for the two concerned users to communicate and exchange keys. However, for systems in which there are a large number of users or in which the users do not personally know each other (e.g., Internet shopping), this is not practical. There are various
215:
service, if you will. Such CAs can be private organizations providing such assurances, or government agencies, or some combination of the two. However, in a significant sense, this merely moves the key authentication problem back one level for any CA may make a good faith certification of some key
192:, is easily possible. No public key is inherently bound to any particular user, and any user relying on a defective binding (including Alice herself when she sends herself protected messages) will have trouble.
216:
but, through error or malice, be mistaken. Any reliance on a defective key certificate 'authenticating' a public key will cause problems. As a result, many people find all PKI designs unacceptably insecure.
128:
This is usually done after the keys have been shared among the two sides over some secure channel. However, some algorithms share the keys at the time of authentication.
148:
who is trying to read or spoof the communication. There are various algorithms used now-a-days to prevent such attacks. The most common among the algorithms are
211:) represents to both parties involved that the public keys each holds which allegedly belong to the other, actually do so. A digital
86:
58:
165:
65:
39:
355:
336:
105:
72:
207:(CA) acts as a 'trusted third party' for the communicating users and, using cryptographic binding methods (e.g.,
149:
161:
54:
43:
365:
260:
229:
200:
301:
186:
145:
380:
235:
153:
132:
algorithms for both symmetric keys and asymmetric public key cryptography to solve this problem.
32:
79:
306:
286:
240:
196:
255:
250:
204:
291:
8:
276:
157:
185:
is claimed publicly to be that of user Alice, but is in fact a public key belonging to
332:
208:
189:
245:
177:
374:
271:
212:
141:
296:
281:
266:
219:
Accordingly, key authentication methods are being actively researched.
21:
360:
171:
144:
cryptography, this is the problem of assuring that there is no
327:
Tanenbaum, Andrew S.; Wetherall, David J. (7 October 2010).
195:
The most common solution to this problem is the use of
135:
46:. Unsourced material may be challenged and removed.
326:
372:
199:and certificate authorities (CAs) for them in a
361:Kerberos: The Network Authentication Protocol
140:For key authentication using the traditional
172:Authentication using Public Key Cryptography
164:. Other methods that can be used include
106:Learn how and when to remove this message
373:
166:Password-authenticated key agreement
44:adding citations to reliable sources
15:
119:
13:
14:
392:
366:Kerberos Authentication explained
349:
136:Authentication using Shared Keys
20:
31:needs additional citations for
320:
1:
313:
356:Honest Achmed asks for trust
7:
222:
150:Diffie–Hellman key exchange
10:
397:
187:man-in-the-middle attacker
162:Needham–Schroeder protocol
146:man-in-the-middle attacker
261:Identity based encryption
230:Public-key infrastructure
201:public-key infrastructure
302:Transport Layer Security
236:Public-key cryptography
197:public key certificates
154:Key distribution center
152:, authentication using
307:Threshold cryptosystem
287:Public key fingerprint
241:Key-agreement protocol
122:/Config-authentication
256:ID-based cryptography
251:Certificate authority
205:certificate authority
176:Crypto systems using
292:Quantum cryptography
55:"Key authentication"
40:improve this article
277:Pretty Good Privacy
209:digital signatures
203:(PKI) system. The
329:Computer Networks
116:
115:
108:
90:
388:
343:
342:
324:
121:
111:
104:
100:
97:
91:
89:
48:
24:
16:
396:
395:
391:
390:
389:
387:
386:
385:
371:
370:
352:
347:
346:
339:
325:
321:
316:
311:
225:
174:
168:protocols etc.
138:
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
394:
384:
383:
381:Key management
369:
368:
363:
358:
351:
350:External links
348:
345:
344:
338:978-0132126953
337:
318:
317:
315:
312:
310:
309:
304:
299:
294:
289:
284:
279:
274:
269:
264:
258:
253:
248:
246:Access control
243:
238:
233:
226:
224:
221:
178:asymmetric key
173:
170:
137:
134:
114:
113:
28:
26:
19:
9:
6:
4:
3:
2:
393:
382:
379:
378:
376:
367:
364:
362:
359:
357:
354:
353:
340:
334:
330:
323:
319:
308:
305:
303:
300:
298:
295:
293:
290:
288:
285:
283:
280:
278:
275:
273:
272:PGP word list
270:
268:
265:
262:
259:
257:
254:
252:
249:
247:
244:
242:
239:
237:
234:
231:
228:
227:
220:
217:
214:
210:
206:
202:
198:
193:
191:
188:
184:
179:
169:
167:
163:
159:
155:
151:
147:
143:
142:symmetric key
133:
129:
126:
123:
110:
107:
99:
96:November 2023
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
328:
322:
297:Secure Shell
282:Pseudonymity
218:
194:
182:
175:
139:
130:
127:
118:
117:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
331:. Pearson.
314:References
267:Key escrow
66:newspapers
375:Category
223:See also
158:kerberos
80:scholar
335:
213:notary
190:Mallet
82:
75:
68:
61:
53:
263:(IBE)
232:(PKI)
87:JSTOR
73:books
333:ISBN
181:key
160:and
59:news
120:Key
42:by
377::
156:,
341:.
183:A
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.