RSA Keon Validation Server 2.0 Installation Guide

Total Page:16

File Type:pdf, Size:1020Kb

RSA Keon Validation Server 2.0 Installation Guide RSA Keon Validation Server 2.0 Installation Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security Ireland Limited www.rsasecurity.com www.rsasecurity.ie Trademarks ACE/Agent, ACE/Server, Because Knowledge is Security, BSAFE, ClearTrust, Keon, RC2, RC4, RC5, RSA, the RSA logo , RSA Secured, RSA Security, SecurCare, SecurID, Smart Rules, The Most Trusted Name in e- Security, and Virtual Business Units are registered trademarks, and e-Titlement, the RSA Secured logo, SecurWorld, and Transaction Authority are trademarks of RSA Security Inc. in the U.S and/or other countries. Microsoft, Windows, Windows 2000, Windows XP, Windows 2003, and Outlook are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Netscape is a registered trademark of Netscape Communications Corporation in the U.S. and other countries. Navigator and Enterprise Server are also trademarks of Netscape Communications Corporation and may be registered outside the U.S. Solaris and Java are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. nFast, nShield, nForce and KeySafe are either registered trademarks or trademarks of nCipher Corporation Ltd. in the United States and/or other countries. Other product and service names mentioned herein may be the trademarks of their respective companies. Portions Copyright © 1992-1996 Regents of the University of Michigan. All rights reserved. License agreement This software and the associated documentation are proprietary and confidential to RSA Security, are furnished under license, and may be copied only in accordance with the terms of such license and with the inclusion of this notice and any other copyright, trademark or other proprietary markings or notices contained in the software and documentation. Neither this software nor any copies thereof may be provided to or otherwise made available to any third party. No title to or ownership of the software or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by RSA Security. Third party licenses This product may include software developed by parties other than RSA Security. The text of the license agreements applicable to third party software in this product may be viewable in the thirdpartylicense.pdf file. This product includes software developed by Apache Software Foundation (http://www.apache.org/). Note on encryption technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import or export of encryption technologies, and current use, import and export regulations should be followed when exporting this product. Distribution Limit distribution of this document to trusted personnel. Copyright © 2003 RSA Security Inc. All rights reserved. Portions of this product use technologies patented under U.S. patent numbers 5,922,074 and 6,249,873. II RSA SECURITY Contents Preface. .5 chapter 1. System Requirements . .11 Supported Platforms . 11 System Configuration . 11 Browser Support for Administration . 11 Cryptographic Support . 12 RSA Public Key Technology . 12 Hardware Security Module Support . 13 Interoperability Requirements . 13 chapter 2. Installation Overview . .15 System Architecture. 15 Protocols Used Within Keon VS . 16 Installed CAs . 16 Issued Certificates . 16 Keon VS File Directory Structure. 17 chapter 3. Installing Keon VS . .19 Before You Begin. 19 Pre-Installation Checklist . 19 Installation Procedure . 20 Post-Installation Checklist . 22 chapter 4. Managing Audit Logs . .23 Configuring Logging . 23 Managing Audit Log Files . 23 chapter 5. Uninstalling Keon VS . .25 Stopping Keon VS . 25 Uninstalling Keon VS . 25 appendix A. Configuring Keon VS . .27 appendix B. Troubleshooting Keon VS. .29 appendix C. Cryptographic Hardware Interoperability . .31 RSA KEON VALIDATION SERVER INSTALLATION GUIDE III Contents appendix D. Media Verification . .37 Glossary . .41 Acronyms . .55 Index . .57 IV RSA SECURITY Preface About RSA Security With thousands of customers around the globe, RSA Security (NASDAQ: RSAS) provides interoperable solutions for establishing online identities, access rights, and privileges for people, applications, and devices. Built to work seamlessly and transparently in the complex environments of thousands of customers, the Company’s comprehensive portfolio of identity and access management solutions—including authentication, Web access management, and developer solutions—is designed to allow customers to confidently exploit new technologies for competitive advantage. RSA Security’s strong reputation is built on its history of ingenuity and leadership, proven technologies, and long-standing relationships with more than 1,000 technology partners. About RSA Keon Validation Server RSA Keon Validation Server (Keon VS) provides certificate status information to public key infrastructure (PKI) applications. Using Online Certificate Status Protocol (OCSP), Keon VS acquires status information for certificates issued by one or more certificate authorities (CAs). A Keon VS signer signs status responses, which ensures that OCSP clients can validate and trust the status responses they receive. A trusted CA certifies the Keon VS signer. About the RSA Keon Validation Server Installation Guide This guide describes the installation of RSA Keon Validation Server. For the latest information about the RSA Keon Validation Server product, see the RSA Keon Validation Server README on the RSA Keon Validation Server CD-ROM or the SecurCare Online Web site. In the event of a discrepancy, the readme files take precedence over this document and the online documentation. In the event of a discrepancy between this document and the online documentation, the online documentation should take precedence. RSA KEON VALIDATION SERVER INSTALLATION GUIDE 5 Preface Conventions These alerts are used in the RSA Keon Validation Server Installation Guide:: Caution This alert warns you of instances where an instruction or procedure not followed exactly could result significant or irrevocable damage to your installation (hardware or software). Important This alert highlights information that you need to know to keep the software operating correctly. Note This alert points to tips that may make the software run more smoothly or provides additional information about a concept or procedure. These typographic conventions are used in the RSA Keon Validation Server Installation Guide: Bold Interface items such as menus, menu commands, and buttons. Bold Italics Hyperlinks in the user interface. Fixed-width Code fragments and command line arguments, parameters, font options, URLs, and directories. These writing conventions are used in the RSA Keon Validation Server Installation Guide: <installed-dir> The directory where the product is installed. > Indicates selecting an item from a menu in an application. For example, the instruction “Click File > New” indicates that a user should click the File menu and select New. RSA Keon Product Suite RSA Keon Certificate Authority RSA Keon Certificate Authority (Keon CA) is the central component of the RSA Keon product suite. One copy of Keon CA allows you to manage multiple certificate authorities and issue certificates under each of them. The rest of the RSA Keon product suite works with Keon CA to provide a full PKI solution. RSA Keon Registration Authority RSA Keon Registration Authority (Keon RA) works with Keon CA to easily enroll large numbers of customers or users for certificate usage. You can use Keon RA to create and manage RAs (registration authorities) to perform registration services on 6 RSA SECURITY Preface behalf of a CA. The most common service is vetting end-users who enroll for a certificate. The RAs created by Keon RA also serve to provide greater control in limiting access to Keon CA. RSA Keon OneStep RSA Keon OneStep (Keon OneStep) is a feature of Keon CA that enables automatic issuance of certificates. Keon OneStep includes an API that enables your enterprise to build customized plug-ins for autovetting certificate requests through the optionally installed Keon OneStep CGI program. The Keon OneStep CGI program handles the process of authenticating, approving, issuing, and installing certificates in one automatic operation, without human intervention. A subset of the Keon OneStep API enables your enterprise to build customized plug-ins for the CMP server. RSA Keon WebSentry RSA Keon WebSentry enables Web servers to offer high-assurance user authentication through digital certificates by seamlessly PKI-enabling Web servers and providing real-time validity checking of a user’s certificate. Web administrators can also use certificates to limit access to private or sensitive files stored on their Web sites. RSA Keon Key Recovery Module RSA Keon Key Recovery Module (Keon KRM) is an add-on module to Keon CA. It can be used to store and recover users’ private keys used for data encryption. Keon KRM works with a standard Keon CA installation. Its administrative functions are integrated into the Keon CA interface. Keon KRM generates RSA public key encryption keypairs in a secure hardware module on a central server. RSA Keon Certificate Authority API RSA Keon Certificate Authority API (Keon CA API) allows
Recommended publications
  • Cen Workshop Agreement Cwa 15264-1
    CEN CWA 15264-1 WORKSHOP April 2005 AGREEMENT ICS 35.240.15 English version Architecture for a European interoperable eID system within a smart card infrastructure This CEN Workshop Agreement has been drafted and approved by a Workshop of representatives of interested parties, the constitution of which is indicated in the foreword of this Workshop Agreement. The formal process followed by the Workshop in the development of this Workshop Agreement has been endorsed by the National Members of CEN but neither the National Members of CEN nor the CEN Management Centre can be held accountable for the technical content of this CEN Workshop Agreement or possible conflicts with standards or legislation. This CEN Workshop Agreement can in no way be held as being an official standard developed by CEN and its Members. This CEN Workshop Agreement is publicly available as a reference document from the CEN Members National Standard Bodies. CEN members are the national standards bodies of Austria, Belgium, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Slovakia, Slovenia, Spain, Sweden, Switzerland and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMITÉ EUROPÉEN DE NORMALISATION EUROPÄISCHES KOMITEE FÜR NORMUNG Management Centre: rue de Stassart, 36 B-1050 Brussels © 2005 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No.:CWA 15264-1:2005 E CWA
    [Show full text]
  • Making Sense of Snowden, Part II: What's Significant in the NSA
    web extra Making Sense of Snowden, Part II: What’s Significant in the NSA Revelations Susan Landau, Google hen The Guardian began publishing a widely used cryptographic standard has vastly wider impact, leaked documents from the National especially because industry relies so heavily on secure Inter- Security Agency (NSA) on 6 June 2013, net commerce. Then The Guardian and Der Spiegel revealed each day brought startling news. From extensive, directed US eavesdropping on European leaders7 as the NSA’s collection of metadata re- well as broad surveillance by its fellow members of the “Five cords of all calls made within the US1 Eyes”: Australia, Canada, New Zealand, and the UK. Finally, to programs that collected and stored data of “non-US” per- there were documents showing the NSA targeting Google and W2 8,9 sons to the UK Government Communications Headquarters’ Yahoo’s inter-datacenter communications. (GCHQs’) interception of 200 transatlantic fiberoptic cables I summarized the initial revelations in the July/August is- at the point where they reached Britain3 to the NSA’s pene- sue of IEEE Security & Privacy.10 This installment, written in tration of communications by leaders at the G20 summit, the late December, examines the more recent ones; as a Web ex- pot was boiling over. But by late June, things had slowed to a tra, it offers more details on the teaser I wrote for the January/ simmer. The summer carried news that the NSA was partially February 2014 issue of IEEE Security & Privacy magazine funding the GCHQ’s surveillance efforts,4 and The Guardian (www.computer.org/security).
    [Show full text]
  • Public Key Cryptography And
    PublicPublic KeyKey CryptographyCryptography andand RSARSA Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/ Washington University in St. Louis CSE571S ©2011 Raj Jain 9-1 OverviewOverview 1. Public Key Encryption 2. Symmetric vs. Public-Key 3. RSA Public Key Encryption 4. RSA Key Construction 5. Optimizing Private Key Operations 6. RSA Security These slides are based partly on Lawrie Brown’s slides supplied with William Stallings’s book “Cryptography and Network Security: Principles and Practice,” 5th Ed, 2011. Washington University in St. Louis CSE571S ©2011 Raj Jain 9-2 PublicPublic KeyKey EncryptionEncryption Invented in 1975 by Diffie and Hellman at Stanford Encrypted_Message = Encrypt(Key1, Message) Message = Decrypt(Key2, Encrypted_Message) Key1 Key2 Text Ciphertext Text Keys are interchangeable: Key2 Key1 Text Ciphertext Text One key is made public while the other is kept private Sender knows only public key of the receiver Asymmetric Washington University in St. Louis CSE571S ©2011 Raj Jain 9-3 PublicPublic KeyKey EncryptionEncryption ExampleExample Rivest, Shamir, and Adleman at MIT RSA: Encrypted_Message = m3 mod 187 Message = Encrypted_Message107 mod 187 Key1 = <3,187>, Key2 = <107,187> Message = 5 Encrypted Message = 53 = 125 Message = 125107 mod 187 = 5 = 125(64+32+8+2+1) mod 187 = {(12564 mod 187)(12532 mod 187)... (1252 mod 187)(125 mod 187)} mod 187 Washington University in
    [Show full text]
  • Crypto Wars of the 1990S
    Danielle Kehl, Andi Wilson, and Kevin Bankston DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990S CYBERSECURITY June 2015 | INITIATIVE © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. AUTHORS Danielle Kehl, Senior Policy Analyst, Open Technology Institute Andi Wilson, Program Associate, Open Technology Institute Kevin Bankston, Director, Open Technology Institute ABOUT THE OPEN TECHNOLOGY INSTITUTE ACKNOWLEDGEMENTS The Open Technology Institute at New America is committed to freedom The authors would like to thank and social justice in the digital age. To achieve these goals, it intervenes Hal Abelson, Steven Bellovin, Jerry in traditional policy debates, builds technology, and deploys tools with Berman, Matt Blaze, Alan David- communities. OTI brings together a unique mix of technologists, policy son, Joseph Hall, Lance Hoffman, experts, lawyers, community organizers, and urban planners to examine the Seth Schoen, and Danny Weitzner impacts of technology and policy on people, commerce, and communities.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • RSA BSAFE Crypto-C 5.21 FIPS 140-1 Security Policy2.…
    RSA Security, Inc. RSA™ BSAFE® Crypto-C Crypto-C Version 5.2.1 FIPS 140-1 Non-Proprietary Security Policy Level 1 Validation Revision 1.0, May 2001 © Copyright 2001 RSA Security, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Table of Contents 1 INTRODUCTION.................................................................................................................. 3 1.1 PURPOSE ............................................................................................................................. 3 1.2 REFERENCES ....................................................................................................................... 3 1.3 DOCUMENT ORGANIZATION ............................................................................................... 3 2 THE RSA BSAFE PRODUCTS............................................................................................ 5 2.1 THE RSA BSAFE CRYPTO-C TOOLKIT MODULE .............................................................. 5 2.2 MODULE INTERFACES ......................................................................................................... 5 2.3 ROLES AND SERVICES ......................................................................................................... 6 2.4 CRYPTOGRAPHIC KEY MANAGEMENT ................................................................................ 7 2.4.1 Protocol Support........................................................................................................
    [Show full text]
  • Elements of Cryptography
    Elements Of Cryptography The discussion of computer security issues and threats in the previous chap- ters makes it clear that cryptography provides a solution to many security problems. Without cryptography, the main task of a hacker would be to break into a computer, locate sensitive data, and copy it. Alternatively, the hacker may intercept data sent between computers, analyze it, and help himself to any important or useful “nuggets.” Encrypting sensitive data com- plicates these tasks, because in addition to obtaining the data, the wrongdoer also has to decrypt it. Cryptography is therefore a very useful tool in the hands of security workers, but is not a panacea. Even the strongest cryp- tographic methods cannot prevent a virus from damaging data or deleting files. Similarly, DoS attacks are possible even in environments where all data is encrypted. Because of the importance of cryptography, this chapter provides an introduction to the principles and concepts behind the many encryption al- gorithms used by modern cryptography. More historical and background ma- terial, descriptions of algorithms, and examples, can be found in [Salomon 03] and in the many other texts on cryptography, code breaking, and data hiding that are currently available in libraries, bookstores, and the Internet. Cryptography is the art and science of making data impossible to read. The task of the various encryption methods is to start with plain, readable data (the plaintext) and scramble it so it becomes an unreadable ciphertext. Each encryption method must also specify how the ciphertext can be de- crypted back into the plaintext it came from, and Figure 1 illustrates the relation between plaintext, ciphertext, encryption, and decryption.
    [Show full text]
  • Public Key Cryptography
    Public Key Cryptography Shai Simonson Stonehill College Introduction When teaching mathematics to computer science students, it is natural to emphasize constructive proofs, algorithms, and experimentation. Most computer science students do not have the experience with abstraction nor the appreciation of it that mathematics students do. They do, on the other hand, think constructively and algorithmically. Moreover, they have the programming tools to experiment with their algorithmic intuitions. Public-key cryptographic methods are a part of every computer scientist’s education. In public-key cryptography, also called trapdoor or one-way cryptography, the encoding scheme is public, yet the decoding scheme remains secret. This allows the secure transmission of information over the internet, which is necessary for e-commerce. Although the mathematics is abstract, the methods are constructive and lend themselves to understanding through programming. The mathematics behind public-key cryptography follows a journey through number theory that starts with Euclid, then Fermat, and continues into the late 20th century with the work of computer scientists and mathematicians. Public-key cryptography serves as a striking example of the unexpected practical applicability of even the purest and most abstract of mathematical subjects. We describe the history and mathematics of cryptography in sufficient detail so the material can be readily used in the classroom. The mathematics may be review for a professional, but it is meant as an outline of how it might be presented to the students. “In the Classroom” notes are interspersed throughout in order to highlight exactly what we personally have tried in the classroom, and how well it worked.
    [Show full text]
  • The Rc4 Stream Encryption Algorithm
    TTHEHE RC4RC4 SSTREAMTREAM EENCRYPTIONNCRYPTION AALGORITHMLGORITHM William Stallings Stream Cipher Structure.............................................................................................................2 The RC4 Algorithm ...................................................................................................................4 Initialization of S............................................................................................................4 Stream Generation..........................................................................................................5 Strength of RC4 .............................................................................................................6 References..................................................................................................................................6 Copyright 2005 William Stallings The paper describes what is perhaps the popular symmetric stream cipher, RC4. It is used in the two security schemes defined for IEEE 802.11 wireless LANs: Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). We begin with an overview of stream cipher structure, and then examine RC4. Stream Cipher Structure A typical stream cipher encrypts plaintext one byte at a time, although a stream cipher may be designed to operate on one bit at a time or on units larger than a byte at a time. Figure 1 is a representative diagram of stream cipher structure. In this structure a key is input to a pseudorandom bit generator that produces a stream
    [Show full text]
  • The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories
    The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through the company that Ronald Rivest, Adi Shamir and Leonard Adleman started in 1982 to commercialize the RSA encryption algorithm that they had invented. At the time, Kaliski had just started his undergraduate degree at MIT. Professor Rivest was the advisor of his bachelor’s, master’s and doctoral theses, all of which were about cryptography. When Kaliski finished his graduate work, Rivest asked him to consider joining the company, then called RSA Data Security. In 1989, he became employed as the company’s first full-time scientist. He is currently chief scientist at RSA Laboratories and vice president of research for RSA Security. Introduction Number theory may be one of the “purest” branches of mathematics, but it has turned out to be one of the most useful when it comes to computer security. For instance, number theory helps to protect sensitive data such as credit card numbers when you shop online. This is the result of some remarkable mathematics research from the 1970s that is now being applied worldwide. Sensitive data exchanged between a user and a Web site needs to be encrypted to prevent it from being disclosed to or modified by unauthorized parties. The encryption must be done in such a way that decryption is only possible with knowledge of a secret decryption key. The decryption key should only be known by authorized parties. In traditional cryptography, such as was available prior to the 1970s, the encryption and decryption operations are performed with the same key.
    [Show full text]
  • FIPS 140-2 Validation Certificate No. 1092
    s 40-2 ---ticn Ce ·...ica The National Institute of Standards The Communications Security and Technology of the United States Establishment of the Government of America of Canada Certificate No. 1092 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results of the Cryptographic Module identified as: RSA BSAFE® Crypto-C Micro Edition by RSA Security. Inc. (When operated in FIPS mode) in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (including voice systems). Products which use the above identified cryptographic module may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life cycle, continues to use the validated version of the cryptographic module as specified in this certificate. The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM: A Cemrlcatlon Mar~ or NIST, which does not Imply product endorsemenl by Nl~.T, the US., or CanadIan Governmenls .........-- - ..-------" FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4.
    [Show full text]
  • Lecture 9 – Public-Key Encryption
    Lecture 9 – Public-Key Encryption COSC-466 Applied Cryptography Adam O’Neill Adapted from http://cseweb.ucsd.edu/~mihir/cse107/ Recall Symmetric-Key Crypto • In this setting, if Alice wants to communicate secure with Bob they need a shared key KAB. Recall Symmetric-Key Crypto • In this setting, if Alice wants to communicate secure with Bob they need a shared key KAB. • If Alice wants to also communicate with Charlie they need a shared key KAC. Recall Symmetric-Key Crypto • In this setting, if Alice wants to communicate secure with Bob they need a shared key KAB. • If Alice wants to also communicate with Charlie they need a shared key KAC. • If Alice generates KAB and KAC they must be communicated to Bob and Charlie over secure channels. How can this be done? Public-Key Crypto • Alice has a secret key that is shared with nobody, and a public key that is shared with everybody. Public-Key Crypto • Alice has a secret key that is shared with nobody, and a public key that is shared with everybody. • Anyone can use Alice’s public key to send her a private message. Public-Key Crypto • Alice has a secret key that is shared with nobody, and a public key that is shared with everybody. • Anyone can use Alice’s public key to send her a private message. • Public key is like a phone number: Anyone can look it up in a phone book. Public-Key Crypto • Alice has a secret key that is shared with nobody, and a public key that is shared with everybody.
    [Show full text]