ABSTRACT

The problem of distributing and managing cryptographic keys is simpler with public keys than with secret keys. Obviously, a secret key must be kept confidential, but not so for a public key. We do not need to worry about the confidentiality of a public key. Rather it should become as publicly and readily available as possible. Nevertheless, public keys do not escape the other requirements of cryptographic key distribution. These are the requirements of authenticity of origin, the integrity of the key value, and the validity of usage.