First page Back Continue Last page Overview Graphics
Some Problems
Compromised keys can be used for masquerading and disclosure attacks
Key distribution can be complex
Not scalable in large systems
Many secret (symmetric) key systems are weak compared to PKI (Public Key Infrastructure) approaches.