1、 大学 毕业设计 (论文 )外文资料翻译 学院 (系 ): 计算机学院 专 业: 信息安全 学生姓名: 班级学号: 外文出处: William Stallings. Cryptography and Network Security, Fourth Edition. Prentice Hall. November 16, 2005 附件: 1.外文资料翻译译文; 2.外文原文 指导教师评语: 指导教师签名: 年 月 日 外文资料翻译 原文 10.1. Key Management In Chapter 7, we examined the problem of the distribution
2、 of secret keys. One of the major roles of public-key encryption has been to address the problem of key distribution. There are actually two distinct aspects to the use of public-key cryptography in this regard: The distribution of public keys The use of public-key encryption to distribute secret ke
3、ys We examine each of these areas in turn. Distribution of Public Keys Several techniques have been proposed for the distribution of public keys. Virtually all these proposals can be grouped into the following general schemes: Public announcement Publicly available directory Public-key authority Pub
4、lic-key certificates Public Announcement of Public Keys On the face of it, the point of public-key encryption is that the public key is public. Thus, if there is some broadly accepted public-key algorithm, such as RSA, any participant can send his or her public key to any other participant or broadc
5、ast the key to the community at large (Figure 10.1). For example, because of the growing popularity of PGP (pretty good privacy, discussed in Chapter 15), which makes use of RSA, many PGP users have adopted the practice of appending their public key to messages that they send to public forums, such
6、as USENET newsgroups and Internet mailing lists. Although this approach is convenient, it has a major weakness. Anyone can forge such a public announcement. That is, some user could pretend to be user A and send a public key to another participant or broadcast such a public key. Until such time as u
7、ser A discovers the forgery and alerts other participants, the forger is able to read all encrypted messages intended for A and can use the forged keys for authentication (see Figure 9.3). Publicly Available Directory A greater degree of security can be achieved by maintaining a publicly available dynamic directory of public keys. Maintenance and distribution of the public directory