1 What is the purpose of the X.509 standard?
2 What is a chain of certificates?
3 How is an X.509 certificate revoked?
4 Give examples of replay attacks.
5 List three general approaches to dealing with replay attacks.
1 What are two different uses of public-key cryptography related to key distribution?
2 List four general categories of schemes for the distribution of public keys.
3 What are the essential ingredients of a public-key directory?
4 What is a public-key certificate?
5 What are the requirements for the use of a public-key certificate scheme?