Public-Key Infrastructure (PKI
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
This paper presents a survey on Public-Key Infrastructure (PKI). This discussion is centered on overview of public-key infrastructure, its key elements, PKI management functions, protocols, digital certificate format and its applications. Public-key infrastructure (PKI) as the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on asymmetric cryptography. Public-key infrastructure based on digital certificates and certificate authorties in order to securely implement public key cryptography. The principle objectives of developing a PKI is to enable secure, conventional, and efficient acquistion of public keys. A PKI enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates.
Authors and Affiliations
Anju Sharma , Neeraj Goyat , Vinod Saroha
Simulation and Analysis of Dropped Packets for DSR Protocol in VANETs Simulation and Analysis of Dropped Packets for DSR Protocol in VANETs
VANET (Vehicular Adhoc Network) is a new concept in the field of wireless networks. The main objective of VANET is to build a powerful network between mobile vehicles so that the vehicles can talk to each other for...
Study of User Experience (UX) and UX Evaluation methods.
The goal of user experience analysis and evaluation methods in the software industry is to improve customer satisfaction through the utility, ease of use, and quality of interaction with applications, services and...
Experimental And Numerical Analysis Of Temperature Distribution In Submerged Arc Welding Process
In large steel fabrication industries such as shipbuilding, and high-speed train guide way, the problem of residual stresses and overall distortion has been and continues to be a major issue. In the last few decades,...
Effective Estimation of Peak-Power for a Testable Digital Circuit
Peak power corresponds to the highest value of instantaneous power measured during testing. The peak power generally determines the thermal and electrical limits of the circuit and the system packaging requiremen...
Enforcing Multi-user Security Policies in Cloud Computing
The user can access data from any server with unlimited data with the security. Multi-user tendency will cost lesser than the expected cost in the single user environment. While dealing with cloud computing, confidential...