Certificates
PK cryptography can solve its own problem
Use PK signatures to vouch for the authenticity of others’ keys
Two general approaches
- X.509 Certification Authorities
- centralized, hierarchical, authoritarian
- used in secure web transactions
- PGP “web of trust”
- decentralized, flat, democratic