Since public keys in asymmetric cryptosystems need not be kept secret, key management in those systems is simpler than in symmetric schemes. Private keys, however, must be kept secret. Also, public keys must be protected from falsification and abuse. Therefore, appropriate public-key infrastructures (PKI) must be set up. They are responsible for key distribution and management. In this chapter, we describe how such public-key infrastructures work.
Unable to display preview. Download preview PDF.