Authenticity by using Digital Certificate and Secure Communication through Key Agreement Protocol

Mamatha vayelapelli, P.S. Avadhani

Abstract


An essential component of Internet security is based on public key cryptography, the twopart encryption scheme where one part of the key is held privately and the other is made
public. This technology has given rise to a small but growing industry that provides Certificate Authority services (CA). These companies verify that a server computers public key is valid and combine it with their own public key to create a unique Digital Certificate. A digital certificate is simply an electronic “statement”, signed by an independent and trusted third party, in a format that is standardized so that its contents can be decoded by a client programs such as Web browsers. The most common digital certificates on the Internet follow a standard named X.509.The technical and
documentary relationships for certifying the authenticity of the public keys of server(and client) computers on the Internet is referred to collectively as public key infrastructure(or
PKI).It is a secure system that is used to manage and control certificates . Digital signatures can be used to protect the authenticity and integrity of data objects. Key agreement is achieved by using secret key cryptography. If two or more entities want to employ and want to make use of secret key cryptography, then they must share a secret parameter or cryptographic key. Consequently, in a large system many secret keys must typically be generated, stored and managed, destroyed in a secure way. Key agreement
protocols are proposed in this paper basing on the concept of digital signature. Discrete logarithm (DL) based protocol is analyzed in detail further.

Keywords: Public-key, digital certificate, user authentication, key negotiation, certification authority, secure communication


Full Text:

PDF

References


Harn L., Ren J. Generalized Digital

Certificate for User Authentication and

Key Establishment for Secure

Communications. IEEE trans. on

Wireless Communications. 2011; 10:

–2379p.

Shamir A. Identity-based cryptosystems

and signature schemes. In Advances in

Cryptology: Proc. Crypto’84, Lecture

Notes in Computer Science vol., (Berlin)

Springer-Verlag. 1985; 196: 47–53p.

Network Working Group Internet X.509

public key infrastructure certificate and crl

profile. RFC: 2459. January 1999.

Chaum D. Private signature and proof

systems. 1996.

Chun J., Hwang J., Lee D. A note on

leakage-resilient authenticated key

exchange. IEEE Trans. Wireless

Communication. May 2009; 8: 2274–

p.

ElGamal T. A. A public-key cryptosystem

and a signature scheme based on discrete

logarithms. IEEE Trans. Inf. Theory.

; 31(4): 469–472p.

Harn L., Xu Y. Design of generalized

ElGamal type digital signature schemes

based on discrete logarithm. Electron.

Lett.1994; 30(24): 2025–2026p.

Mihara A., Tanaka K. Universal

designated-verifier signature with

aggregation. In Proc.Third International

Conf. Inf. Technol. Appl., 2005.

Diffie W., Hellman M. E. New directions

in cryptography. IEEE Trans. Inf.

Theory.1976; 22: 644–654p.

Rivest R., Shamir A., Adleman L. A

method for obtaining digital signatures

and public-key cryptosystems.

Communication Assoc. Comp. 1978;

(2): 120–126p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/