Implementation Issues of Pki Technology

نویسندگان

  • Victor - Valeriu PATRICIU
  • Marin BICA
  • Ion BICA
چکیده

Today, one of the biggest concerns about using the Internet for business-critical data is security. This paper will concentrate on the area of software security based on public key cryptographic technology. The Public Key systems make it possible for two parties to communicate securely without either having to know or trust the other party. This is possible because a third party, called the Certification Authority, that both the other parties trust identifies them, and certifies that their keys are genuine. This third party guarantees that they are who they claim to be. A public key infrastructure (PKI) is a set of technologies and security policies that a company can use to issue, revoke, and manage digital certificates within its organizational structure. The paper tries to analyse some of major deployment aspects of an organizational PKI and the main design issues for a Public Key Infrastructure (PKI), needed to secure network applications. Typically cryptographic functions require keys which are used to encrypt and decrypt the data and are known only by trusted entities. There are two commonly known flavours of key-based cryptography, known as symmetric key, and asymmetric key. As the names suggest, symmetric key cryptography uses the same key to encrypt and decrypt data, while asymmetric key cryptography uses two keys which are mutual inverses (one decrypts the other's encryption). Asymmetric cryptography is known as public key cryptography, because one half of the key pair can be published without compromising the overall security of the system. Public keys may be maintained in a database, with associated subject identity and other information, each record is known as a certificate. Certificates, however, do not by themselves enhance the trust in the system as a trusted third party is still required to create

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PKI Implementation Issues: A Comparative Study of Pakistan with some Asian Countries

The paper includes Public Key Infrastructure (PKI), its need and requirements and introduction of some renowned PKI products. However, the major thrust of this work is that how PKI can enhance security of various systems. The paper is intended to serve as a guide on how to adequately prepare for some of the challenges that may be encountered especially in developing countries like Pakistan. The...

متن کامل

PKI Technology Survey and Blueprint

This paper presents and examines the results of a series of interviews in which a cross-section of experienced programmers, system administrators, and technical project managers with many years of practical, real-world experience were asked which technologies they would use to solve some of the major problems which occur in PKI implementation. The results of the interviews and various significa...

متن کامل

PKI - Advantages and Obstacles

Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and governments around the globe. The Public Key Infrastructure (PKI) model tries to solve these issues and make the Internet more secure. This paper explains the main purposes of PKI and addresses some of the major issue...

متن کامل

Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce

With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone user with the wireless internet service. Security supporting wireless internet must be guaranteed at same level as the wired security. But PKI (Public Key Infrastructure) which is used for the security of e-commerce in wired internet is not suitable for the mobile phone...

متن کامل

A New PKI-based Single Sign-On Protocol for a Diminutive Security Device, PANDA, in a Ubiquitous Security Environment

This paper describes the issues and challenges in the design of a new PKI-based security infrastructure enhanced with single sign-on and delegation technology for a diminutive security device in a ubiquitous security environment. In order to provide the PKI-based ubiquitous security infrastructure in consideration of the issues, we propose a PKI-based single signon protocol that provides a user...

متن کامل

PKI in B2C E-Commerce

General purpose (open) and application-specific (closed) PKIs are two main categories of PKI that support a variety of cryptographic operations for providing secure environment. SSL/TLS and SET are two distinct security protocols utilising these PKI categories for securing e-commerce transactions. While the former protocol categorised as a general purpose PKI has been playing an important role ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002