answersLogoWhite

0

I'm not certain of the intent of the question but it sounds like what is being asked is how you can know the actual identity of someone from their public key - i.e. how you can know that the public key really belongs to the person it purports to belong to. PKI (public key infrastructure) is one way to establish with reasonable certainty that a key really belongs to the entity that is claimed. PKI uses a system of Certificate Authorities (CA) and Registration Authorities (RA). At the top of the chain is the Registration Authority that everyone trusts. Users register their public keys with the RA. CA's also register their certificates withe the RA along with proof that they are who they say they are. CA's are repositories of public keys that the public can access. They sign the keys with their own certificates vouching for the identity of the public key owner. The identity of the CA may, in turn, be vouched for by an RA or higher CA who sign the certificate of that particular CA.

User Avatar

Wiki User

13y ago

What else can I help you with?

Continue Learning about Computer Science

What happens when devices connect to the Internet using a public IP address that is not reserved?

While using a public IP address, it is possible that others will be able to see what you're doing. Don't do anything personal.


What is chat server?

A computer or web host that is dedicated to providing the processing power to maintain and handle chatting. They are able to handle all the users who are on the chat site or in the chat rooms at the same time.


How do you decrypt a data file to that has been encrypted with the users public key?

When you reference a "public key" you are implying that the file has been encrypted using "asymmetric cryptography". In asymmetric cryptography, encryption and decryption depend on a key PAIR. The user retains their private key and publishes their public key. Anyone can encrypt a file using the user's public key and send it to them. The only person who should be able to decrypt a file encrypted with that public key is the holder of the private key - which, unless the user has made the mistake of sharing their private key - means that only the original user can decrypt the messages sent to them. Most of the asymmetric encryption algorithms use pretty much the same method to decrypt that was used to encrypt, but use the "other" key from the key pair. Messages encrypted using the private key can only be decrypted using the public key - which provides some authentication that the message indeed came from the holder of the private key. Messages encrypted using the public key can only be decrypted by the holder of the private key, so messages sent to them should be secure.


List and define the three classes of subject in an access control system?

Owner: This may be the creator of a resource, such as a file. Group: In addition to the privileges assigned to an owner, a named group of users may also be the granted access rights. World: The latest amount of access is granted to users who are able to access the system but are not included in the categories owner and group of this resource.


Should you make yourself the administrator of your computer?

It is necessary for you to be the administrator of your PC or else you will not be able to install specific programs or change settings. Only create a limited account for other users who constantly change the settings of the PC

Related Questions

Is wikis open to modification by the general public?

Yes, unless protected all answers are able to be modified by registered users.


What are users able to do on most blogs?

Users will be able to comment,post,discuss and reply.


Identify customers needs and expectations in terms of public services?

Customers expect to have their needs met and their questions answered. They want to be able to trust in their public services to give them good service.


Are you able to hide your trust points from other users on Wikianswers?

No, you are not able to hide your trust points from other users.


How an organisation able to identify the need for marketing activities?

how is an organization able to identify the need for marketing activities


How you are able identify mars?

You can identify it by telling that its red or orange.


Who was able to identify huck and the king?

Sherbun was able to identify Huck and the king


What is a sentence using the word identify?

They were not able to identify the man in the lineup. It was not easy to identify the owner of the car.


Why does a country need an infrastructure?

A country needs an infrastructure because an infrastructure consists of the basic support systems needed to keep an economy going. The better the infrastructure, the more developed the country.


Why is it important to be able to identify sets and set theory as related to business operations?

Why is it important to be able to identify sets and set theory as related to business operations?


What is most likely used to be used to prevent users from accessing blocked web content?

Firewalls are used to prevent users. The users will not be able to see the blocked content then.


What is an authenticated users?

An authenticated users are those who have passed the identification/authentication process of a particular system and are able to log-on in that system.