Public Key Deception
Moral:
Public key encryption for privacy, confidentiality, authentication, and message integrity only works if
The verifier gets the true party’s public key independently of the applicant,
From a trusted third party
Previous slide
Next slide
Back to first slide
View graphic version