Public Key Infrastructure
Public Key Infrastructure
KEY
INFRASTRUCTURE
*Internet Publications
for Standards
Internet Publications for Standards
the Internet Activities Board (IAB)
is the body responsible for
coordinating Internet design,
engineering and management.
The IAB has two subsidiary task
forces:
The Internet Engineering Task
Force (IETF), which is responsible
for short-term engineering issues
including Internet standards.
The Internet Research Task Force
(IRTF), which is responsible for
long-term research.
Another important series of
Internet publications are the Internet
Drafts. These are working documents
prepared by IETF, its working groups,
or other groups or individuals working
on Internet technical topics. Internet
Drafts are valid for a maximum of six
months and may be updated,
replaced or rendered obsolete by
other documents at any time.
The X.500 standard specifies the
directory service. A comprehensive
online directory service has been
developed through the ISO/ITU
standardisation processes. These
directory standards provide the basis
for constructing a multipurpose
distributed directory service by
interconnecting computer systems
belonging to service providers,
governments and private
organisations.
X.500 standards were first developed
in 1984–1988, the use of X.500
directories for distributing public-key
certificates was recognised.
Therefore, the standards include full
specifications of data items required
for X.500 to fulfil this role.
The Internet Lightweight
Directory Access Protocol (LDAP)
is a protocol which can access
information stored in a directory,
including access to stored public-key
certificates.
*Digital Signing Techniques
Digital signing techniques are
employed to provide sender
authentication, message integrity and
sender non-repudiation, provided that
private keys are kept secret and the
integrity of public keys is preserved.
Provision of these services is
furnished with the proper association
between the users and their
public/private key pairs.
When two users A and B
communicate, they can use their
public keys to keep their messages
confidential. If A wishes to hide the
contents of a message to B, A
encrypts Digital signing techniques
are used in a number of applications.
Since digital signature technology has
grown in demand, its explosive
utilisation and development will be
expected to continue in the future.
Several applications are considered
in the following.
Electronic mail security: Electronic
mail is needed to sign digitally,
especially in cases where sensitive
information is being transmitted and
security services such as
authentication, integrity and
nonrepudiation are desired.
Financial transactions: This
encompasses a number of areas in
which money is being transferred
directly or in exchange for services
and goods.
Electronic filing: Contracting
requirements expect certain
mandated certificates to be
submitted from contractors. This
requirement is often filed through
the submission of a written form
and usually requires a handwritten
signature.
Software protection: Digital
signatures are also used to protect
software. By signing the software,
the integrity of the software is
assured when it is distributed.
Signing and authenticating: Signing
is the process of using the sender’s
private key to encrypt the message
digest of a document. Anyone with
the sender’s public key can decrypt
it.
Algorithm