Go backward to Announcements
Go up to Top
Go forward to Widely used encryption standards

Secret vs Public Key Encryption

  1. Last time, we saw how to use secret keys and a KDS to ensure private communications.

  2. We also discussed how public keys could be used to provide privacy and irrefutably signed digital messages if we could ensure that one could determine everyone else's public key reliably.

  3. With this background on the use of public key encryption to produce signed digital documents, we can sketch out how a certified authority can allow one to determine another's public key.


Computer Science 336
Department of Computer Science
Williams College

Prev Up Next