Key Management
Key exchange over insecure channels
Inherent weaknesses of a “Trustworthy Model”
Secure Link
Courier Use
Central Authority Use
Public Key Exchange as a solution to the listed problems
Previous slide
Next slide
Back to first slide
View graphic version