Part Five: Mutual Trust
CHAPTER 15
Cryptographic Key Management and Distribution
15.1 Symmetric Key Distribution Using Symmetric Encryption
Third-Party Key Distribution Options
15.2 Symmetric Key Distribution Using Asymmetric Encryption
Simple Secret Key Distribution
Secret Key Distribution with Confidentiality and Authentication
15.3 Distribution of Public Keys
Public Announcement of Public Keys
15.5 Public-Key Infrastructure
LEARNING OBJECTIVES
After studying this chapter, you should be able to:
- ◆ Discuss the concept ...
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.