security infrastructure and protocolsapki and pgp


Security Infrastructure and Protocols

a) PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust.

b) The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust modelassumed in SSL, and compare it with the trust model used in Kerberos. Kerberos is designed to operate is a relatively small domain, such as a single company. Discuss the practical issues around extending the Kerberos trust model to a global scale, say to provide secure services between Amazon and its customer base.

Request for Solution File

Ask an Expert for Answer!!
Computer Networking: security infrastructure and protocolsapki and pgp
Reference No:- TGS0501178

Expected delivery within 24 Hours