Internet Security: Public-Key Infrastractures and Certification Systems
نویسندگان
چکیده
In the current business environment there is an ever growing view of the World Wide Web, commonly referred to as the Internet, as the new frontier for electronic commerce or ecommerce. As a result many businesses are developing applications and/or websites in order to conduct e-commerce on the Internet without properly considering the implications of the certification system that they are choosing to use, if they use one at all. The aim of this paper is to present work in the area of public key infrastructures and certification systems by discussing important topics pertaining to this area of research. The security needs of businesses will be initially discussed as an introduction to certification systems. This leads into the discussions of X.509 public key infrastructures and certificate revocation, where the associated problems will be discussed.
منابع مشابه
The Internet public key infrastructure
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...
متن کاملPerformance Evaluation of Distributed Security Protocols Using Discrete Event Simulation
The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in large networks, we need public key infrastructures (PKIs). Protocols that distribute and validate certificates introduce additional complexities and co...
متن کاملSecure Internet Phone
This paper describes the design and implementation of a secure internet phone utilizing a smartcard-based public key infrastructure. First, available hardware and software based systems are discussed followed by a description of the architecture of our system. More detailed information on the public key infrastructure including the certification authority, the client and the public key server a...
متن کاملDistributed PKI in P2P Networks
Internet security today is based almost entirely on a public key infrastructure that allows authentication and encryption of data. However this PKI heavily relies on central institutions, namely the Certification Authorities (CAs), that issue certificates. In pure P2P networks such central instances are unwanted because they contradict the P2P paradigms. In this paper, we describe how a Certifi...
متن کاملPublic Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected. Therefore, verifying the legitimacy of an individual’s public key is very important. Most of the key authentication schemes require one or more trustworthy authorities to authenticate the key of a user. Consequently,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004