answersLogoWhite

0

I'm not certain of the intent of the question but it sounds like what is being asked is how you can know the actual identity of someone from their public key - i.e. how you can know that the public key really belongs to the person it purports to belong to. PKI (public key infrastructure) is one way to establish with reasonable certainty that a key really belongs to the entity that is claimed. PKI uses a system of Certificate Authorities (CA) and Registration Authorities (RA). At the top of the chain is the Registration Authority that everyone trusts. Users register their public keys with the RA. CA's also register their certificates withe the RA along with proof that they are who they say they are. CA's are repositories of public keys that the public can access. They sign the keys with their own certificates vouching for the identity of the public key owner. The identity of the CA may, in turn, be vouched for by an RA or higher CA who sign the certificate of that particular CA.

User Avatar

Wiki User

13y ago

What else can I help you with?

Continue Learning about Computer Science

What happens when devices connect to the Internet using a public IP address that is not reserved?

While using a public IP address, it is possible that others will be able to see what you're doing. Don't do anything personal.


What is chat server?

A computer or web host that is dedicated to providing the processing power to maintain and handle chatting. They are able to handle all the users who are on the chat site or in the chat rooms at the same time.


How do you decrypt a data file to that has been encrypted with the users public key?

When you reference a "public key" you are implying that the file has been encrypted using "asymmetric cryptography". In asymmetric cryptography, encryption and decryption depend on a key PAIR. The user retains their private key and publishes their public key. Anyone can encrypt a file using the user's public key and send it to them. The only person who should be able to decrypt a file encrypted with that public key is the holder of the private key - which, unless the user has made the mistake of sharing their private key - means that only the original user can decrypt the messages sent to them. Most of the asymmetric encryption algorithms use pretty much the same method to decrypt that was used to encrypt, but use the "other" key from the key pair. Messages encrypted using the private key can only be decrypted using the public key - which provides some authentication that the message indeed came from the holder of the private key. Messages encrypted using the public key can only be decrypted by the holder of the private key, so messages sent to them should be secure.


List and define the three classes of subject in an access control system?

Owner: This may be the creator of a resource, such as a file. Group: In addition to the privileges assigned to an owner, a named group of users may also be the granted access rights. World: The latest amount of access is granted to users who are able to access the system but are not included in the categories owner and group of this resource.


Should you make yourself the administrator of your computer?

It is necessary for you to be the administrator of your PC or else you will not be able to install specific programs or change settings. Only create a limited account for other users who constantly change the settings of the PC

Related Questions

Is wikis open to modification by the general public?

Yes, unless protected all answers are able to be modified by registered users.


What are users able to do on most blogs?

Users will be able to comment,post,discuss and reply.


Identify customers needs and expectations in terms of public services?

Customers expect to have their needs met and their questions answered. They want to be able to trust in their public services to give them good service.


Are you able to hide your trust points from other users on Wikianswers?

No, you are not able to hide your trust points from other users.


How an organisation able to identify the need for marketing activities?

how is an organization able to identify the need for marketing activities


How you are able identify mars?

You can identify it by telling that its red or orange.


Who was able to identify huck and the king?

Sherbun was able to identify Huck and the king


What is a sentence using the word identify?

They were not able to identify the man in the lineup. It was not easy to identify the owner of the car.


Why does a country need an infrastructure?

A country needs an infrastructure because an infrastructure consists of the basic support systems needed to keep an economy going. The better the infrastructure, the more developed the country.


Why is it important to be able to identify sets and set theory as related to business operations?

Why is it important to be able to identify sets and set theory as related to business operations?


The word identify in a sentence?

Although she suffered significant injuries, the brave woman was able to identify her attacker.Every student was able to identify all 50 states on the U.S. map.Researchers have begun to identify foods that slow the aging process.Leary about strangers coming to the door, she asked the officer to identify himself and show his badge.


What is most likely used to be used to prevent users from accessing blocked web content?

Firewalls are used to prevent users. The users will not be able to see the blocked content then.

Trending Questions
When troubleshooting for connectivity issues why is it important to check the physical conditions of the network before running a complex antivirus program? Shadow of the colossus where is the vitels on colossus 15? What is a cached page? What is the networking software? Which level of Abstraction describes how data are stored in the data base? Is PC for gaming? While performing routine maintenance a user notices that the desk area around the computer is cluttered and dusty After cleaning the desk area what action should the user take to clean the computer? How has the internet changed the characteristics of the sources of mass communication? If a TCP server were to support n simultaneous connections each from a different client host how many sockets would the TCP server need? How is the classification system useful in technology? N which mode is a VTP switch operating if it has been configured to only forward VTP advertisements? E mail adrees? The performance of a computer is reduced after it has been using the Internet Which three tools could be run to try to improve the performance of the computer Choose three? What are four parts of a database listed in ascending order? Who is HAL's programer in 2001 A Space Odyssey? How many buses are in the world? Identify any problems that are associated with networked computers? What are the advantage of using latest electrical equipments? Can a clear disk crash a computer? How do you download Adobe after effect free?