Encryption to, Authentication from LIR
Use
Harder to impersonate LIR
LIRs network plans will not be on the Internet in plain-text.
Remarks
RIPE NCC needs LIR’s public key.
LIR will need to create private keys.
Key-exchange more difficult.
Previous slide
Next slide
Back to first slide
View graphic version