Internet Security: Public-Key Infrastractures and Certification Systems

نویسندگان

  • Ben Soh
  • Luke Sledziona
چکیده

In the current business environment there is an ever growing view of the World Wide Web, commonly referred to as the Internet, as the new frontier for electronic commerce or ecommerce. As a result many businesses are developing applications and/or websites in order to conduct e-commerce on the Internet without properly considering the implications of the certification system that they are choosing to use, if they use one at all. The aim of this paper is to present work in the area of public key infrastructures and certification systems by discussing important topics pertaining to this area of research. The security needs of businesses will be initially discussed as an introduction to certification systems. This leads into the discussions of X.509 public key infrastructures and certificate revocation, where the associated problems will be discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Internet public key infrastructure

Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...

متن کامل

Performance Evaluation of Distributed Security Protocols Using Discrete Event Simulation

The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in large networks, we need public key infrastructures (PKIs). Protocols that distribute and validate certificates introduce additional complexities and co...

متن کامل

Secure Internet Phone

This paper describes the design and implementation of a secure internet phone utilizing a smartcard-based public key infrastructure. First, available hardware and software based systems are discussed followed by a description of the architecture of our system. More detailed information on the public key infrastructure including the certification authority, the client and the public key server a...

متن کامل

Distributed PKI in P2P Networks

Internet security today is based almost entirely on a public key infrastructure that allows authentication and encryption of data. However this PKI heavily relies on central institutions, namely the Certification Authorities (CAs), that issue certificates. In pure P2P networks such central instances are unwanted because they contradict the P2P paradigms. In this paper, we describe how a Certifi...

متن کامل

Public Key Authentication Schemes for Local Area Networks

The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected. Therefore, verifying the legitimacy of an individual’s public key is very important. Most of the key authentication schemes require one or more trustworthy authorities to authenticate the key of a user. Consequently,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004