Advanced Cryptography
This week’s reading expounds a bit on last week’s content. We will cover certificates, public key infrastructure and key management. Answer the following questions and then discuss with your classmates:
- Please read the article on the risks of key recovery, key escrow and 3rd party encryption at https://www.schneier.com/paper-key-escrow.html. What do you think are the most important points made in this article, and why? Make sure to relate it to the course readings.
- Explain when a PKI is required. In your opinion, which of the three discussed trust models would be the easiest to use, manage and maintain across an enterprise organization, and why? Would this also be the most effective?