Map
Index
Random
Help
th

QuoteRef: zimmPR_1995

topics > all references > ThesaHelp: references t-z



ThesaHelp:
references t-z
Topic:
public key encryption
Topic:
security leaks and weaknesses
Topic:
key distribution
Topic:
authentication
Topic:
limitations of system security

Reference

Zimmermann, P.R., The official PGP user's guide, Cambridge MA, MIT Press, 1995. Google

Quotations
25 ;;Quote: public-key cryptosystems are vulnerable to forgery and man-in-the-middle attacks
26 ;;Quote: prevent public key forgery with signed public key certificates from mutually trusted friends; allows centralized and decentralized approaches
26 ;;Quote: a key server or certifying authority can "introduce" users to each other with signed, public-key certificates
26 ;;Quote: never trust a public key that isn't signed by someone you trust, i.e., someone whose trusted public key is on your key ring
26 ;;Quote: to sign a public key, you should require your own independent firsthand knowledge of who owns that key
28 ;;Quote: physically secure your public key ring, otherwise you can not check a new signed public key certificate
29 ;;Quote: PGP assumes physical security of your system and key rings; otherwise an intruder could tamper with PGP itself
31 ;;Quote: physically secure your own secret key and pass phrase; if it is revealed then anyone can sign in your name


Related Topics up

ThesaHelp: references t-z (309 items)
Topic: public key encryption (30 items)
Topic: security leaks and weaknesses (56 items)
Topic: key distribution (33 items)
Topic: authentication (87 items)
Topic: limitations of system security (32 items)

Collected barberCB 3/98
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.