Tutorial: Technological infrastructure for PKI and digital certification

  • Authors:
  • Ray Hunt

  • Affiliations:
  • Department of Computer Science, University of Canterbury, Private Bag 4800, Christchruch, New Zealand

  • Venue:
  • Computer Communications
  • Year:
  • 2001

Quantified Score

Hi-index 0.24

Visualization

Abstract

Secure E-Commerce and VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable E-business. This paper discusses these key technologies focusing particularly on recent standardisation as well as looking at some of the criticism and challenges to its widespread operation in the industry.