Map
Index
Random
Help
th

Quote: public-key cryptosystems are vulnerable to forgery and man-in-the-middle attacks

topics > all references > references t-z > QuoteRef: zimmPR_1995 , p. 25



Topic:
public key encryption
Topic:
security leaks and weaknesses
Topic:
key distribution

Quotation Skeleton

In fact, it's better if [public keys] are widely … public key really belongs to whom it appears … [For example,] Charlie has infiltrated the [bulletin board system] and generated … his bogus key in place of Alice's real … [Now all messages to Alice can be read by Charlie before forwarding to Alice.] … [p. 26] The only way to prevent this disaster …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: public key encryption (30 items)
Topic: security leaks and weaknesses (56 items)
Topic: key distribution (33 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.