This presentation covers public key distribution and includes several methods: - Public announcement of keys allows anyone to broadcast their public key but anyone can pretend to be another user. - Public directories are maintained by a trusted center and associate public keys with user names but users must register their keys. - Public key authorities add controls like timestamps and digital signatures to prevent interception when distributing keys. - Public key certificates are issued by a certification authority that verifies users' identities and binds public keys to entities.