5
Most read
11
Most read
13
Most read
WELCOME TO MY PRESENTATION
A Presentation on
Public Key Distribution
Topics to be covered by
 Public key cryptography
 Public key announcement
 Trusted center and Controlled trusted center
 Certification Authority
 X.509
 Public key Infrastructures
Public Key Distribution
 Diffie - Hellman (1976) proposed the “public file”
concept
 Universally accessible
 No unauthorized modification
Public Key Cryptography
 In public key cryptography, everyone has access to
everyone’s public key.
 Public key are available to everyone.
Ways of Public Key Distribution:
 Public Announcement
 Trusted center
 Controlled trusted center
 Certification Authority
 Public key Infrastructures
Public Announcement
 Each person /user can announce or broadcast their public key to
the world.
 No authenticity : It is not a secure way.
Fig: Announcing a public key
Trusted Center
 It has a directory and the directory can be publicly
advertised by the trusted center
 User can keep the private key, and deliver the
public key for insertion into the directory.
 The center can also respond to any inquiry about a
public key
Fig: Trusted center
Controlled Trusted Center
 Controls are added on the distribution of the
public keys to achieve a higher level of security.
 The public key announcement can include a
timestamp.
 Trusted center can be signed by an authority to
prevent interception and modification of the
response.
Fig: Controlled trusted center
Certification Authority
 Certification Authority(CA) which is a federal or
state organization that binds a public key to an entity
and issues a certificate.
 CA must verify the entity requesting a new
certificate.
 CA’s own certificate is signed by a higher-level CA.
Root CA’s certificate is self-signed and its name is
“well- known”.
Fig: Certification authority
X.509
 CA has solved the problem of public –key fraud
but it has created a side-effect. To remove this
side-effect, ITU has designed a protocol called
X.509.
 X.509 uses a well known protocol called ASN.1.
Public-Key Infrastructures (PKI)
 A public key infrastructures a set of roles, policies
and procedures needed to create, manage,
distribute, use, store digital certificates and
manage public-key encryption.
 It is a hierarchical structure.
PKI hierarchy:
Summary:
 Distribution of public keys.
 X.509 authentication.
 A hierarchical system (PKI) to answer queries
about key certification.
ANY QUESTION???
THANK YOU

More Related Content

PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PDF
18CS2005 Cryptography and Network Security
PPT
X.509 Certificates
PDF
Web Security
DOCX
S/MIME
PPTX
Key Management and Distribution
PPTX
Kerberos
PPTX
Message and Stream Oriented Communication
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
18CS2005 Cryptography and Network Security
X.509 Certificates
Web Security
S/MIME
Key Management and Distribution
Kerberos
Message and Stream Oriented Communication

What's hot (20)

PPTX
x.509-Directory Authentication Service
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Replication in Distributed Systems
PPT
Secure Socket Layer
PPT
Distributed System-Multicast & Indirect communication
PPTX
Forward and Backward chaining in AI
PPTX
Block cipher modes of operation
PPTX
Key management
PPTX
Kerberos
PPTX
Relationship Among Token, Lexeme & Pattern
PPTX
Double DES & Triple DES
PPTX
Feistel cipher
PPT
PGP S/MIME
PPTX
Transport layer security (tls)
PPT
Digital signature
PPTX
Diffie hellman key exchange algorithm
PDF
CS6601 DISTRIBUTED SYSTEMS
PPT
Authentication Protocols
PPT
Data encryption standard
PDF
Run time storage
x.509-Directory Authentication Service
CRYPTOGRAPHY AND NETWORK SECURITY
Replication in Distributed Systems
Secure Socket Layer
Distributed System-Multicast & Indirect communication
Forward and Backward chaining in AI
Block cipher modes of operation
Key management
Kerberos
Relationship Among Token, Lexeme & Pattern
Double DES & Triple DES
Feistel cipher
PGP S/MIME
Transport layer security (tls)
Digital signature
Diffie hellman key exchange algorithm
CS6601 DISTRIBUTED SYSTEMS
Authentication Protocols
Data encryption standard
Run time storage
Ad

Similar to Public Key Distribution (20)

PPTX
publickey-181006180859.pptx
PPT
CHAPTER 14 CRYPTOGR AND NETWORK SECURITY
PPT
Key management.ppt
PPT
Crypto Analysis slides presentation slides
PPT
Is unit-4-part-1
PPT
Unit 1INTRODUCTION AND KEY MANAGEMENT
PPT
Key Managment in Network Security William Stalling
PPT
ch14_ Key management in network security
PDF
Public key Infrastructure (PKI)
PPTX
Public Key Distribution
PDF
Ijarcet vol-2-issue-7-2307-2310
PDF
Ijarcet vol-2-issue-7-2307-2310
PPTX
Module III CNS Kerberos and its example.pptx
PPT
Protocols for Public Key Management
PPT
Network security.ppt
PDF
PUBLIC KEY INFRASTRUCTURE Network and network devices
PPT
NS Unit 3 AAR.ppt
PPTX
Public Key Infrastructures
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
publickey-181006180859.pptx
CHAPTER 14 CRYPTOGR AND NETWORK SECURITY
Key management.ppt
Crypto Analysis slides presentation slides
Is unit-4-part-1
Unit 1INTRODUCTION AND KEY MANAGEMENT
Key Managment in Network Security William Stalling
ch14_ Key management in network security
Public key Infrastructure (PKI)
Public Key Distribution
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
Module III CNS Kerberos and its example.pptx
Protocols for Public Key Management
Network security.ppt
PUBLIC KEY INFRASTRUCTURE Network and network devices
NS Unit 3 AAR.ppt
Public Key Infrastructures
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
Ad

More from Mostafijur Rahman (7)

PPTX
Health-aware Personalized Food Recommender System
PPTX
Tower of Hanoi
PDF
Project Proposal
PPTX
Key management
PPT
Challenge responese networking
PPTX
Namaz remainder demo presentation
DOCX
Trapezoidal Method IN Numerical Analysis
Health-aware Personalized Food Recommender System
Tower of Hanoi
Project Proposal
Key management
Challenge responese networking
Namaz remainder demo presentation
Trapezoidal Method IN Numerical Analysis

Recently uploaded (20)

PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PPTX
CC PPTS unit-I PPT Notes of Cloud Computing
PPTX
highway-150803160405-lva1-app6891 (1).pptx
PDF
Module 1 part 1.pdf engineering notes s7
PPTX
quantum theory on the next future in.pptx
PPTX
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
PDF
Traditional Programming vs Machine learning and Models in Machine Learning
PPTX
Cloud Security and Privacy-Module-2a.pptx
PPTX
non conventional energy resorses material unit-1
PDF
ITEC 1010 - Networks and Cloud Computing
PPTX
L1111-Important Microbial Mechanisms.pptx
PPTX
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
PDF
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
PPTX
IOP Unit 1.pptx for btech 1st year students
PPTX
MODULE 3 SUSTAINABLE DEVELOPMENT GOALSPPT.pptx
PPT
Basics Of Pump types, Details, and working principles.
PDF
1.-fincantieri-investor-presentation2.pdf
PPTX
operating system Module 5 Secondary storage
PPT
Unit - I.lathemachnespct=ificationsand ppt
PDF
CBCN cam bien cong nghiep bach khoa da năng
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
CC PPTS unit-I PPT Notes of Cloud Computing
highway-150803160405-lva1-app6891 (1).pptx
Module 1 part 1.pdf engineering notes s7
quantum theory on the next future in.pptx
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
Traditional Programming vs Machine learning and Models in Machine Learning
Cloud Security and Privacy-Module-2a.pptx
non conventional energy resorses material unit-1
ITEC 1010 - Networks and Cloud Computing
L1111-Important Microbial Mechanisms.pptx
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
02. INDUSTRIAL REVOLUTION & Cultural, Technical and territorial transformatio...
IOP Unit 1.pptx for btech 1st year students
MODULE 3 SUSTAINABLE DEVELOPMENT GOALSPPT.pptx
Basics Of Pump types, Details, and working principles.
1.-fincantieri-investor-presentation2.pdf
operating system Module 5 Secondary storage
Unit - I.lathemachnespct=ificationsand ppt
CBCN cam bien cong nghiep bach khoa da năng

Public Key Distribution

  • 1. WELCOME TO MY PRESENTATION
  • 2. A Presentation on Public Key Distribution
  • 3. Topics to be covered by  Public key cryptography  Public key announcement  Trusted center and Controlled trusted center  Certification Authority  X.509  Public key Infrastructures
  • 4. Public Key Distribution  Diffie - Hellman (1976) proposed the “public file” concept  Universally accessible  No unauthorized modification
  • 5. Public Key Cryptography  In public key cryptography, everyone has access to everyone’s public key.  Public key are available to everyone.
  • 6. Ways of Public Key Distribution:  Public Announcement  Trusted center  Controlled trusted center  Certification Authority  Public key Infrastructures
  • 7. Public Announcement  Each person /user can announce or broadcast their public key to the world.  No authenticity : It is not a secure way.
  • 8. Fig: Announcing a public key
  • 9. Trusted Center  It has a directory and the directory can be publicly advertised by the trusted center  User can keep the private key, and deliver the public key for insertion into the directory.  The center can also respond to any inquiry about a public key
  • 11. Controlled Trusted Center  Controls are added on the distribution of the public keys to achieve a higher level of security.  The public key announcement can include a timestamp.  Trusted center can be signed by an authority to prevent interception and modification of the response.
  • 13. Certification Authority  Certification Authority(CA) which is a federal or state organization that binds a public key to an entity and issues a certificate.  CA must verify the entity requesting a new certificate.  CA’s own certificate is signed by a higher-level CA. Root CA’s certificate is self-signed and its name is “well- known”.
  • 15. X.509  CA has solved the problem of public –key fraud but it has created a side-effect. To remove this side-effect, ITU has designed a protocol called X.509.  X.509 uses a well known protocol called ASN.1.
  • 16. Public-Key Infrastructures (PKI)  A public key infrastructures a set of roles, policies and procedures needed to create, manage, distribute, use, store digital certificates and manage public-key encryption.  It is a hierarchical structure.
  • 18. Summary:  Distribution of public keys.  X.509 authentication.  A hierarchical system (PKI) to answer queries about key certification.