Authenticity by using Digital Certificate and Secure Communication through Key Agreement Protocol
Abstract
An essential component of Internet security is based on public key cryptography, the twopart encryption scheme where one part of the key is held privately and the other is made
public. This technology has given rise to a small but growing industry that provides Certificate Authority services (CA). These companies verify that a server computers public key is valid and combine it with their own public key to create a unique Digital Certificate. A digital certificate is simply an electronic “statement”, signed by an independent and trusted third party, in a format that is standardized so that its contents can be decoded by a client programs such as Web browsers. The most common digital certificates on the Internet follow a standard named X.509.The technical and
documentary relationships for certifying the authenticity of the public keys of server(and client) computers on the Internet is referred to collectively as public key infrastructure(or
PKI).It is a secure system that is used to manage and control certificates . Digital signatures can be used to protect the authenticity and integrity of data objects. Key agreement is achieved by using secret key cryptography. If two or more entities want to employ and want to make use of secret key cryptography, then they must share a secret parameter or cryptographic key. Consequently, in a large system many secret keys must typically be generated, stored and managed, destroyed in a secure way. Key agreement
protocols are proposed in this paper basing on the concept of digital signature. Discrete logarithm (DL) based protocol is analyzed in detail further.
Keywords: Public-key, digital certificate, user authentication, key negotiation, certification authority, secure communication
Full Text:
PDFReferences
Harn L., Ren J. Generalized Digital
Certificate for User Authentication and
Key Establishment for Secure
Communications. IEEE trans. on
Wireless Communications. 2011; 10:
–2379p.
Shamir A. Identity-based cryptosystems
and signature schemes. In Advances in
Cryptology: Proc. Crypto’84, Lecture
Notes in Computer Science vol., (Berlin)
Springer-Verlag. 1985; 196: 47–53p.
Network Working Group Internet X.509
public key infrastructure certificate and crl
profile. RFC: 2459. January 1999.
Chaum D. Private signature and proof
systems. 1996.
Chun J., Hwang J., Lee D. A note on
leakage-resilient authenticated key
exchange. IEEE Trans. Wireless
Communication. May 2009; 8: 2274–
p.
ElGamal T. A. A public-key cryptosystem
and a signature scheme based on discrete
logarithms. IEEE Trans. Inf. Theory.
; 31(4): 469–472p.
Harn L., Xu Y. Design of generalized
ElGamal type digital signature schemes
based on discrete logarithm. Electron.
Lett.1994; 30(24): 2025–2026p.
Mihara A., Tanaka K. Universal
designated-verifier signature with
aggregation. In Proc.Third International
Conf. Inf. Technol. Appl., 2005.
Diffie W., Hellman M. E. New directions
in cryptography. IEEE Trans. Inf.
Theory.1976; 22: 644–654p.
Rivest R., Shamir A., Adleman L. A
method for obtaining digital signatures
and public-key cryptosystems.
Communication Assoc. Comp. 1978;
(2): 120–126p.
Refbacks
- There are currently no refbacks.
This site has been shifted to https://stmcomputers.stmjournals.com/