• DISCUSSION OF DIFFERENT TYPES OF PUBLIC KEY INFRASTRUCTURE IN REAL LIFE

B. KUMARASWAMY ACHARY*, Dr. V. VASU

Abstract


Since public keys in asymmetric cryptosystems need not be kept se­cret, key management in those systems is simpler than in symmetric schemes. Private keys, however, must be kept secret. Also, public keys must be protected from falsification and abuse. Therefore, ap­propriate public-key infrastructures (PKI) must be set up. They are responsible for key distribution and management. In this paper, we describe how such public-key infrastructures work.


Keywords


Public Key Infrastructure (PKI), Certificate Authentic (CA), Certificate revocation list (CRLs).

Full Text:

PDF


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
© 2010-2020 International Journal of Mathematical Archive (IJMA)
Copyright Agreement & Authorship Responsibility
Web Counter