Digital certificate infrastructure functions and types


Download 38.25 Kb.
bet4/4
Sana06.05.2023
Hajmi38.25 Kb.
#1433489
1   2   3   4
Bog'liq
Digital certificate infrastructure functions and types

Acknowledgment

Digital certificates are used in Electronic Commerce but attempts to apply them in ways that mirror written signatures are unlikely to be effective because this analogy is misleading.
‘Trusted Third Parties (TTP) as Certificate Authorities for digital signatures are often justified using an analogy with the role of the financial institutions in conventional commerce. When analyzed in more detail they are most often seen to be sequences of closed two-party relationships that combine to give the appearance of a relationship involving three-parties.
Because of this, it seems unlikely that open digital certificates have a significant role in Electronic Commerce. It also turns out that digital certificates are more effective as mechanisms for attaching permissions to digital signatures instead of names or identities (as the analogy with written signatures leads us to expect). And these properties in combination lead to uses of digital signatures, not as vehicles for identity, but rather as mechanisms that can represent the closed trust relationships on which commerce depends. Identity based digital signatures and the associated Certification Authorities have little immediate relevance in the development of Electronic Commerce. Put in the simplest terms, they are unnecessary for this purpose and seem more likely to delay the emergence of an electronic marketplace than they are to promote its development.
References

  1. Ran Canetti: Universally Composable Signature, Certification and Authentication.CSFW 2004, http:// eprint.iacr.org/2003/239.

  2. Ben Laurie, I an Goldberg. Replacing passwords on the Internet AKA post-Snowden Opportunistic Encrytion. 18 January 2014

  3. Wilson, Wilson. CA/Browser Forum History. DigiCert.Retrieved -2013-04-

  4. Cryptographic PseudoRandom Numbers. Brian Gernhardt. Rochester Institute of Technology. Cryptography II, Spring 2010.

  5. Information security. Richard E.Smith. 2013.

  6. Rivest, R., Shamir, A. and Adleman, L., A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(1978)

  7. RFC 2459, Housley, R., Ford, W., Polk, W., and Solo, D., "Internet X.509 Public Key Infrastructure Certificate and CRL Profile", January 1999

  8. Public- Key Infrastructure – The VerisSign Difference; VeriSign whitpaper, 1999

  9. PKCS#10, RSA, "The Public-Key Cryptography Standards ", RSA Data Security Inc., November 1993

  1. .


Download 38.25 Kb.

Do'stlaringiz bilan baham:
1   2   3   4




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling