An Implementation Suite for a Hybrid Public Key Infrastructure

نویسندگان

چکیده

Public key infrastructure (PKI) plays a fundamental role in securing the of Internet through certification public keys used asymmetric encryption. It is an industry standard by both and private entities that costs lot resources to maintain secure. On other hand, identity-based cryptography removes need for certificates, which turn lowers cost. In this work, we present practical implementation hybrid PKI can issue new cryptographic authentication purposes while bootstrapping trust with existing certificate authorities. We provide set utilities generate use such within context environment as well external (i.e., without root generator). Key revocation solved our custom naming design currently supports few scenarios (e.g., expire date, year valid year). Our offers high degree interoperability incorporating X.509 standards into (IBC) compared works on PKI–IBC systems. The provided are minimalist be integrated tools Enterprise Java Bean Certified Authority (EJBCA).

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Public Key Infrastructure for User Identification

While there is wide agreement on the immense potential of Internet, its growth and performance are adversely affected by security issues. Despite its impressive size, scope and reach, the Internet has not yet become a common vehicle for many of these new possibilities. Progress in fields as electronic commerce and government-citizen relationships have been limited by the open design of the netw...

متن کامل

Resource Public Key Infrastructure (RPKI) Router Implementation Report

This document is an implementation report for the Resource Public Key Infrastructure (RPKI) Router protocol as defined in RFC 6810. The authors did not verify the accuracy of the information provided by respondents. The respondents are experts with the implementations they reported on, and their responses are considered authoritative for the implementations for which their responses represent. ...

متن کامل

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

Wireless Public key Infrastructure for Mobile Phones

Mobile devices play an important role in the wireless network environment for providing different services over internet. The business transactions over wireless electronic devices are not secure and hence the messages are prone to be intercepted and modified by an intruder. So, devices supporting wireless internet must be guaranteed at the same level of security as the wired network. PKI (Publ...

متن کامل

The Internet public key infrastructure

Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2021

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym13081535