Public key management for network security

Abstract
A tutorial is given on two public key cryptographic systems that provide an alternative to classical cryptographic key management techniques: the RSA system and the SEEK system. The certification of public numbers is discussed.