answersLogoWhite

0


Best Answer

I'm not certain of the intent of the question but it sounds like what is being asked is how you can know the actual identity of someone from their public key - i.e. how you can know that the public key really belongs to the person it purports to belong to. PKI (public key infrastructure) is one way to establish with reasonable certainty that a key really belongs to the entity that is claimed. PKI uses a system of Certificate Authorities (CA) and Registration Authorities (RA). At the top of the chain is the Registration Authority that everyone trusts. Users register their public keys with the RA. CA's also register their certificates withe the RA along with proof that they are who they say they are. CA's are repositories of public keys that the public can access. They sign the keys with their own certificates vouching for the identity of the public key owner. The identity of the CA may, in turn, be vouched for by an RA or higher CA who sign the certificate of that particular CA.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is able to identify users with public key infrastructure?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What happens when devices connect to the Internet using a public IP address that is not reserved?

While using a public IP address, it is possible that others will be able to see what you're doing. Don't do anything personal.


What is chat server?

A computer or web host that is dedicated to providing the processing power to maintain and handle chatting. They are able to handle all the users who are on the chat site or in the chat rooms at the same time.


How do you decrypt a data file to that has been encrypted with the users public key?

When you reference a "public key" you are implying that the file has been encrypted using "asymmetric cryptography". In asymmetric cryptography, encryption and decryption depend on a key PAIR. The user retains their private key and publishes their public key. Anyone can encrypt a file using the user's public key and send it to them. The only person who should be able to decrypt a file encrypted with that public key is the holder of the private key - which, unless the user has made the mistake of sharing their private key - means that only the original user can decrypt the messages sent to them. Most of the asymmetric encryption algorithms use pretty much the same method to decrypt that was used to encrypt, but use the "other" key from the key pair. Messages encrypted using the private key can only be decrypted using the public key - which provides some authentication that the message indeed came from the holder of the private key. Messages encrypted using the public key can only be decrypted by the holder of the private key, so messages sent to them should be secure.


List and define the three classes of subject in an access control system?

Owner: This may be the creator of a resource, such as a file. Group: In addition to the privileges assigned to an owner, a named group of users may also be the granted access rights. World: The latest amount of access is granted to users who are able to access the system but are not included in the categories owner and group of this resource.


Should you make yourself the administrator of your computer?

It is necessary for you to be the administrator of your PC or else you will not be able to install specific programs or change settings. Only create a limited account for other users who constantly change the settings of the PC

Related questions

Is wikis open to modification by the general public?

Yes, unless protected all answers are able to be modified by registered users.


Identify customers needs and expectations in terms of public services?

Customers expect to have their needs met and their questions answered. They want to be able to trust in their public services to give them good service.


What are users able to do on most blogs?

Users will be able to comment,post,discuss and reply.


Are you able to hide your trust points from other users on Wikianswers?

No, you are not able to hide your trust points from other users.


How an organisation able to identify the need for marketing activities?

how is an organization able to identify the need for marketing activities


How you are able identify mars?

You can identify it by telling that its red or orange.


Why does a country need an infrastructure?

A country needs an infrastructure because an infrastructure consists of the basic support systems needed to keep an economy going. The better the infrastructure, the more developed the country.


Who was able to identify huck and the king?

The Duke was able to identify Huck and the King as frauds when he noticed discrepancies in their story and behavior, leading him to realize they were not the royal family they claimed to be.


What is a sentence using the word identify?

They were not able to identify the man in the lineup. It was not easy to identify the owner of the car.


What is an example of a sentence using identify?

I can easily identify my best friend in a crowded room by his distinctive laugh.


Why is it important to be able to identify sets and set theory as related to business operations?

Why is it important to be able to identify sets and set theory as related to business operations?


The word identify in a sentence?

Although she suffered significant injuries, the brave woman was able to identify her attacker.Every student was able to identify all 50 states on the U.S. map.Researchers have begun to identify foods that slow the aging process.Leary about strangers coming to the door, she asked the officer to identify himself and show his badge.