For the purposes of sending the keys you can use the algorithms for rsa and Diffie-Hellman DH76. Steffan Lehnhoff, Guatemala City Guatemala is actively involved in the matter. The advantage of asymmetric technique is not necessary to have a central server for storage and distribution of keys. pem system uses digital signatures to authenticate the public keys of users Kent93. The result of this operation is a certificate that contains a public key partner. Key certificates are distributed in various ways. In one embodiment, distribution of keys is built into the existing directory service. This can be done, for example, by empowering the dns and the inclusion of key computers in the resource record new type. For multicast sessions, management of mailing the keys more difficult as the number of exchanges required for the widely used techniques is proportional to the number of participants.
7. Authentication network services also need to authenticate users and computers to each other, many network services themselves require authentication. The most general case now - is the lack of support in the record any authentication. Bellovin and others have documented many cases where existing protocols can be used to attack a remote computer, as there are no built-in authentication procedures Bellovin89. Some protocols provide opportunity to transfer unprotected passwords in conjunction with the protocol information. Initial snmp protocols used this method, many routing protocols continue using it and now Moy91, LR91, CFSD88. This method is useful, since somewhat increases the security of transmission. There are many protocols that need to be supported more stringent authentication mechanisms.