Consider the SSH protocol in Figure 10.1. One variant of the protocol allows us to replace certificate^ with Alice's public key. In this version of the protocol, Alice must have a public/private key pair, but she is not required to have a certificate. It is also possible to replace certificate^ with Bob's public key.
a. Suppose that Bob has a certificate, but Alice does not. What must Bob do so that he can authenticate Alice?
b. Suppose that Alice has a certificate, but Bob does not. What must Alice do so that she can authenticate Bob?
c. What are the significant advantages and disadvantages of this public key version of SSH, as compared to the certificate version in Figure 10.1?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here