This document summarizes a research paper on developing a secure email system using public key infrastructure (PKI). It begins with an introduction describing the need for additional security mechanisms for email beyond what standard email protocols provide. It then provides an overview of how PKI works using public/private key encryption and digital signatures to provide security properties like authentication, integrity, confidentiality and non-repudiation. The document reviews PKI technologies and applications, how infrastructure is provided, and discusses information security and 'PAIN' properties that PKI enables. It concludes with a literature review of cryptography basics like symmetric and asymmetric key algorithms that PKI is built upon.
This presentation covers:
What is Digital Signature ?
How does digital signature work?
Advantages and Shortcomings of Digital Signatures
What is e-Commerce
How does e-commerce work?
Advantages and Disadvantages of e-commerce
This PPT provides an complete reference of "DIGITAL SIGNATURE". It gives "how the digital signature are works?" and "why we need a digital signature?". And also I include some Digital signature algorithm in a Diagrammatic format.
Digital signature and certificate authorityKrutiShah114
This presentation will give you a broad view about digital signature and certificate authority. It also explains the difference between digital signature and electronic signature.
With the outbreak of Covid-19, technological innovations are surfacing at a fast pace. One such prominent technology is eSign or electronic signature. This technology has now started to get attention due to increased digitalization.
This presentation covers:
What is Digital Signature ?
How does digital signature work?
Advantages and Shortcomings of Digital Signatures
What is e-Commerce
How does e-commerce work?
Advantages and Disadvantages of e-commerce
This PPT provides an complete reference of "DIGITAL SIGNATURE". It gives "how the digital signature are works?" and "why we need a digital signature?". And also I include some Digital signature algorithm in a Diagrammatic format.
Digital signature and certificate authorityKrutiShah114
This presentation will give you a broad view about digital signature and certificate authority. It also explains the difference between digital signature and electronic signature.
With the outbreak of Covid-19, technological innovations are surfacing at a fast pace. One such prominent technology is eSign or electronic signature. This technology has now started to get attention due to increased digitalization.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
Digital certificates provide advanced instruments for confirming identities in electronic environments. The application of digital certificates has been gaining global acceptance both in public and private sectors. In fact, the government field has witnessed increasing adoption of cryptographic technologies to address identity management requirements in cyberspace. The purpose of this article is to provide an overview of various governmental scenarios on the usage and application of digital certificates in the United Arab Emirates. The UAE government integrated public key infrastructure (PKI) technology into its identity management infrastructure since 2003. The article also explores the UAE digital identity issuing authority's position regarding government-to-government transactions and the prospective role of digital certificates.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
Security+ Guide to Network Security Fundamentals, 3rd Edition, by Mark Ciampa
Knowledge and skills required for Network Administrators and Information Technology professionals to be aware of security vulnerabilities, to implement security measures, to analyze an existing network environment in consideration of known security threats or risks, to defend against attacks or viruses, and to ensure data privacy and integrity. Terminology and procedures for implementation and configuration of security, including access control, authorization, encryption, packet filters, firewalls, and Virtual Private Networks (VPNs).
CNIT 120: Network Security
http://samsclass.info/120/120_S09.shtml#lecture
Policy: http://samsclass.info/policy_use.htm
Many thanks to Sam Bowne for allowing to publish these presentations.
Digital certificates provide advanced instruments for confirming identities in electronic environments. The application of digital certificates has been gaining global acceptance both in public and private sectors. In fact, the government field has witnessed increasing adoption of cryptographic technologies to address identity management requirements in cyberspace. The purpose of this article is to provide an overview of various governmental scenarios on the usage and application of digital certificates in the United Arab Emirates. The UAE government integrated public key infrastructure (PKI) technology into its identity management infrastructure since 2003. The article also explores the UAE digital identity issuing authority's position regarding government-to-government transactions and the prospective role of digital certificates.
Information Leakage Prevention Using Public Key Encryption System and Fingerp...CSCJournals
The increase in the use of the internet around the world provided easier way of communication and information sharing that has led to the huge challenge of data leakage on the network. In an academic environment such as higher institutions of learning, the need to ensure that access to data and sensitive information are given to authorized users become imperative. However, this is not always the case as security bridges are often experienced. This study proposed a RSA public key encryption system and biometric fingerprint augmented with Apriori algorithm to prevent information leakages. The fingerprint verifies the identity of the owner of incoming message and the Apriori algorithm is used as the detection system instead of biometric that requires additional hardware for detecting fingerprint. This study developed a system based on the proposed algorithm. The developed system was tested on Federal Polytechnic, Ilaro local area network achieving a high level of security that prevents interception of valuable data by intruders or eavesdroppers. The system developed RSA public key encryption and fingerprint augmented with Apriori algorithm thus provided the required security mechanism that prevents information leakage in a public environment.
Public Key Infrastructure, or PKI, is a system of digital certificates and cryptographic keys that are used to authenticate individuals and devices. PKI is essential for secure communications over the internet and is used in a variety of applications, such as email, file sharing, and VPNs.
This presentation contains the total understanging of Digital Certificate ,What is the need and what are the main types of Digital certificates available.
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
Security is one of the extensive and complicated requirements that need to be provided in order to achieve few issues like confidentiality, integrity and authentication. In a content-based publish/subscribe system, authentication is difficult to achieve since there exists no strong bonding between the end parties. Similarly, Integrity and confidentiality needs arise in published events and subscription conflicts with content-based routing. The basic tool to support confidentiality, integrity is encryption. In this paper for providing security mechanism in broker-less content-based publish/subscribe system we adapt pairing-based cryptography mechanism. In this mechanism, we use Identity Based Encryption (IBE) technique to achieve the needs of publish/subscribe system. This approach helps in providing fine-grained key management, effective encryption, decryption operations and routing is carried out in the order of subscribed attributes
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
I would appreciate help with these 4 questions. Thank You.
1) Explain what the following are: root certificates, self-signed certificates. Describe how they
are used. Provide some examples of each explaining how they are used. You should be able to
find examples of each on your system by looking through various options available on your
browser.
2) Provide a listing of the fields associated with a certificate of your choosing. Use the X509
definition to match the general fields of a certificate with the certificate you choose to look at.
Describe each field.
3) Your manager is considering implementing a PKI infrastructure. They are considering using
RSA encryption technology for the central part of their infrastructure. You manager would like
to know some products or services that utilize RSA encryption technology. Provide three
examples and explain how they make use of the RSA encryption technology. Provide a few
original sentences describing each of your examples.
4) Compare the functionality offered by the RSA and Diffie-Hellman algorithms.
Solution
A Root SSL certificate could be a certificate issued by a trusty certificate authority (CA).In the
SSL system, anyone will generate a language key and sign a replacement certificate therewith
signature. However, that certificate isn\'t thought-about valid unless it\'s been directly or
indirectly signed by a trusty CA.A trusty certificate authority is Associate in Nursing entity that
has been entitled to verify that somebody is effectively World Health Organization it declares to
be. so as for this model to figure, all the participants on the sport should agree on a group of CA
that they trust. All operational systems and most of net browsers ship with a group of trusty
CAs.The SSL system is predicated on a model of trust relationship, conjointly known as “chain
of trust”. once a tool validates a certificate, it compares the certificate establishment with the list
of trusty CAs. If a match isn\'t found, the shopper can then check to check if the certificate of the
supplying CA was issued by a trusty CA, so on till the tip of the certificate chain. the highest of
the chain, the basis certificate, should be issued by a trusty Certificate Authority.
Self-signed certificates or certificates issued by a non-public CAs aren\'t appropriate to be used
with the overall public.A certificate serves two essential purpose distribute the public key and
verifying the individuality of the server so guests know they aren’t sending their information to
the wrong person. It can only properly verify the identity of the server when it is signed by a
trusted third party because any attacker can create a self-signed certificate and launch a man-in-
the-middle attack. If a user just accept a self-signed certificate, an attacker could drop on all the
traffic or try to set up an imitation server to phish additional information out of the user. Because
of this, you will approximately on no account want to use a self signe.
The encryption mechanism is a digital coding system dedicated to preserving the confidentiality and integrity of data. It is used for encoding plain text data into a protected and unreadable format.
Define PKI (Public Key Infrastructure) and list and discuss the type.pdfxlynettalampleyxc
Define PKI (Public Key Infrastructure) and list and discuss the types of protection that it offers.
Give an example of where PKI is utilized in daily activity,(industry).
Solution
Answer:-
PKI (Public Key Infrastructure) :
Public Key Infrastructure (PKI) is a popular encryption and authentication approach used by
both small businesses and large enterprises.
What Is Public Key Infrastructure (PKI) :
The PKI environment is made up of five components:
1) Certification Authority (CA) -- serves as the root of trust that authenticates the identity of
individuals, computers and other entities in the network.
2) Registration Authority (RA) : -- is certified by a root CA to issue certificates for uses
permitted by the CA. In a Microsoft PKI environment, the RA is normally called a subordinate
CA.
3) Certificate Database : -- saves certificate requests issued and revoked certificates from the RA
or CA.
4) Certificate Store :-- saves issued certificates and pending or rejected certificate requests from
the local computer.
5) Key Archival Server :-- saves encrypted private keys in a certificate database for disaster
recovery purposes in case the Certificate Database is lost.
6) PKI is a very effective method for implementing multi-factor authentication. Some
companies, such as Unisys, require that devices that are attached to the corporate network must
be able to use PKI for the encrypted and authenticated exchange of information.
7) In cryptography, a PKI is an arrangement that binds public keys with respective identities of
entities (like persons and organizations).
8) A public key infrastructure (PKI) is a system for the creation, storage, and distribution of
digital certificates which are used to verify that a particular public key belongs to a certain entity.
Types Protection:
1) Encryption and/or sender authentication of e-mail messages .
2) Encryption and/or authentication of documents .
3) Authentication of users to applications (e.g., smart card logon, client authentication with SSL).
There\'s experimental usage for digitally signed HTTP authentication in the Enigform and
mod_openpgp projects .
4) Bootstrapping secure communication protocols such as Internet key exchange (IKE) and SSL.
In both of these, initial set-up of a secure channel security association uses asymmetric key ,
public key methods, whereas actual communication uses faster symmetric key, secret key
methods.
5) Mobile signatures are electronic signatures that are created using a mobile device and rely on
signature or certification services in a location independent telecommunication environment..
The ability to conceal the contents of sensitive messages and to verify the contents of messages and the identities of their senders have the potential to be useful in all areas of business
How electronic signature software helps create electonic signature securely SreeramulaSatya
Electronic signatures are rapidly expanding and more businesses and organizations have noticed the benefits of electronic signature. Worried about the security of e-signatures? This is how electronic signature software can help you create electronic signature securely.
Improving System Security and User Privacy in Secure Electronic Transaction (...IJERA Editor
With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET as an open encryption and security specification designed to protect credit card transaction on the internet. This paper proposes a new approach for increasing security by avoiding privacy violation using Public Key Infrastructure, X.509 certificate and Format Preservation encryption method, the credit card number is encrypted using public key algorithm and re-encrypted using Format preservation Encryption algorithm and finally stored in the X.509 version 3 certificate private extensions. This technique can be used to improve the security of the user credit card information against card fraud or the compromise of data associated with the account.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Iaetsd secure emails an integrity assured email
1. SECURE EMAILS: AN INTEGRITY ASSURED EMAIL
SYSTEMS USING PKI
Mohd Yousuf Md Touseef Sumer
Dept. of Computer science & Engineering Dept. of Electronics and Communication Engineering
Maulana Azad National Urdu University Maulana Azad National Urdu University
Hyderabad Hyderabad
yousuf.asifia@gmail.com touseefsumer@yahoo.com
Abstract - Most important aspect of any application is security. Complex business systems, e-Commerce and automated business
transactions require robust security measures. Companies using the internet environment as a platform to conduct business have a
better probability of success if there is security. However, for e-commerce on the internet, additional security and integrity
mechanism becomes necessary. Merchants are typically not willing to ship goods or perform services until a payment has been
accepted for them. Authentication can allow for a measure of non-repudiation so the customer cannot deny the transaction
occurred. Similarly, consumers need assurance that they are purchasing from a legitimate enterprise, rather than a hacker’s site
whose sole purpose is to collect credit card numbers. With the changes in today’s business environments and the shift from the
traditional face-to-face business models, mechanisms must be developed to ensure that trusted relationships are maintained. The
PKI message service is intended to provide mechanisms to ensure trusted relationships are established and maintained. PKI
Message Service with PKI Plug-in demonstrates how public key cryptography supports risk management requirements and solves
e-commerce security problems in network environments. This is one such application which provides necessary security services to
users. This application is also intended to help organizations determine their requirement and necessity for a PKI, and what features
are needed for their specific business. The PKI Message Service and PKI Plug-in may find its application in business transactions,
banking, military etc.
I. INTRODUCTION
As SMTP email is an open protocol in that a message can be
intercepted and read by any number of third parties. When you
send an email message, that message can be seen and read by
anyone who comes in contact with the message; just like a
postcard. For example, your message may pass through a
number of Internet Service Providers on its journey and
administrators for these ISPs will almost undoubtedly have
access to the contents of messages that you send. When we talk
about secure email, we are talking about the ability to secure a
message in such a way that the contents of that message remain
private between you and your intended recipient and vice versa.
This is achieved through encryption.
A second (and arguably more important) issue with SMTP
email is that it is open to abuse and manipulation. It is very easy
for a third party to forge an SMTP message and make up its
content and address details. This act of impersonation is
commonly known as spoofing. From this perspective, SMTP
email is also unsecure. Therefore, any solution for secure email
should not only provide encryption for privacy but also ideally
authentication and validation that messages are genuine and can
be guaranteed to have originated from the apparent sender. The
act of validating the authenticity of a message is known as
digital signing.
II. REVIEW OF PKI
The PKI Message Service is a mail application which is based
on the idea of PKI. PKI assumes the use of key cryptography,
which is the most common method on the Internet for
authenticating a message sender or encrypting a message. The
mail application provides Information Security of user messages
over insecure networks such as the Internet. This application
can be deployed in domains where monetary transactions
happen seldom.The PKI Message Service offers two-factor
authentication of messages sent, therefore providing privacy,
authentication, integrity, and non-repudiation; these being
referred as the PAIN properties satisfied by most of application
pertaining to Security. The Message Service having been based
on the idea of PKI is bound to use asymmetric keys for its
operations. The application provides services to access private
keys from hardware crypto-tokens such as Aladdin/SafeNet e-
tokens. It also provides for accessing private keys from local
file system. The public keys are maintained by the server of the
PKI Message Service, thereby acting similar to a Key
Distribution Centre (KDC).The users of this mailing application
can send messages which are encrypted, digitally signed or
signed and encrypted to their respective destinations. The users
who receive these messages from other users of the same
application can decrypt, verify or verify and decrypt the
messages from their peers. The asymmetric cryptographic
functions offered by the PKI Message Service is provided by
software programs typically coded in JAVA which run on the
client side of the PKI Messaging Service application. The PKI
Message Service employs a server to manage user’s public key
certificates and other details. The Server scripts are typically
coded in PHP, HTML, CSS and JavaScript along with the
services of a Database to store all the related user information.
The purpose of having such an application on the web reduces
effort to create and maintain similar such applications on
multiple platforms. This application is platform independent and
serves well in Microsoft Windows, Mac OS X Systems.
III. PKI FEATURES AND APPLICATIONS
PKI is a security architecture that has been introduced to
provide an increased level of confidence for exchanging
information over an increasingly insecure internet. PKI expands
as Public Key Infrastructure, which is the most common method
on the internet for authenticating a sender or encrypting a
message. Public key infrastructure encompasses comprehensive
security technologies and policies using cryptography and
provides standards for fundamental computing infrastructure
improvement [1].PKI involves the hardware, software, policies,
and standards that are necessary to manage SSL (Secure Socket
Layer) certificates. A PKI lets users: [1] Authenticate other
users more securely than standard usernames and passwords.
[2] Encrypt sensitive information. [3] Electronically sign
documents more efficiently.
The PKI technology works with a pair of keys. One of
the two keys may be used to encrypt information which can
only be decrypted with the other key. One key is made public
and the other is kept secret. The secret key is usually called the
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
1
2. private key. Since anyone may obtain the public key, users may
initiate secure communications without having to previously
share a secret through some other medium with their
correspondent.PKI enables users of an insecure public network
to securely and privately exchange data and money through the
use of a public and a private cryptographic key pair that is
obtained and shared through a trusted authority. PKI provides
for a digital certificate that can identify an individual or an
organization and directory services that can store and, when
necessary, revoke the certificates. Although the components of a
PKI are generally understood, a number of different vendor
approaches and services are emerging. Meanwhile, an internet
standard for PKI is being worked on.PKI binds public keys with
a person so in a way that allows users to trust the certificate.
Public Key Infrastructures most commonly use a certificate
authority (also called a Registration Authority) to verify the
identity of an entity and create unforgeable certificates. Web
browsers, web servers, email clients, smart cards, and many
other types of hardware and software all have integrated,
standards-based PKI support that can be used with each other.
A PKI is only as valuable as the standards that are established
for issuing certificates [1].
IV. APPLICATIONS OF PKI:
The most widespread use of PKI is server
identification of certificates. SSL requires a PKI certificate on
the server to assert its identity in a trustworthy manner to the
client. Every HTTPS (Hyper Text Transport Protocol Secure)
web server connection uses SSL and therefore also uses PKI.
This outreach web focuses on client-side applications of PKI -
using end user PKI certificates instead of or in addition to server
certificates [2].
Client-side applications of PKI fit into three main categories:
Authentication
Digital signatures
Encryption
Authentication applies to any application that needs to
know with assurance the identity of the user and that the user is
actually the one who is present. Traditional authentication
typically uses usernames and passwords. PKI provides a more
secure alternative to this whereby identity is proven by
possession of a private key instead of a password. A password
is still usually required to protect the private key, but that
password is managed by the user instead of shared with the
application server (a major improvement in security).Digital
signatures enable a user to put their "digital signature" on an
electronic document. This is directly analogous to signing in
pen on a paper document except it goes one step further and
associates the exact contents of the digital document with the
signature in a way that makes tampering with the document's
contents after the signature easy to detect. Again, it is
possession of the private key that assures that only the owner of
the PKI digital credentials could have executed the signature.
Encryption is standard protection of data in a file with a
twist. Anyone can encrypt data intended to be read by a
particular user by using their public key for the encryption
process, but only the designated user possesses the private key
that can decrypt the data, so its privacy is assured by the
security of their private key [2].
Some of the popular PKI applications:
[I] Authentication [A] Web applications [a] Portals [b] Student
information systems [c] Library online journals
[B] Network appliances [a] VPN concentrators [b] Firewalls
[c] Wireless access points [II] Digital signatures
[A] S/MIME secure email (sign individual emails)
[B] Electronic document processing [a] Signing XML forms
[b] Signing electronic documents [c] Paperless authorization
processes [C] Instant messaging (sign each message)[D]
Encryption [a] S/MIME secure email (encrypt individual
emails) [b] Instant messaging (encrypt each message)
V. WHO PROVIDES THE INFRASTRUCTURE?
A number of products are offered that enable a
company or group of companies to implement a PKI. The
acceleration of e-commerce and business-to-business commerce
over the internet has increased the demand for PKI solutions.
Related ideas are the virtual private network (VPN) and the IP
security (IPsec) standard [4]. Among PKI leaders are:
[1] RSA, which has developed the main algorithms used by PKI
vendors.[2] VeriSign, which acts as a certificate authority and
sells software that allows a company to create its own certificate
authorities.[3] GTE Cyber Trust, which provides a PKI
implementation methodology and consultation service that it
plans to vend to other companies for a fixed price.[4] Xcert,
whose Web Sentry product that checks the revocation status of
certificates on a server, using the Online Certificate Status
Protocol (OCSP).[5] Netscape, whose Directory Server product
is said to support 50 million objects and process 5,000, queries a
second.[6] Secure E-Commerce, which allows a company or
extranet manager to manage digital certificates.[7] Meta-
Directory, which can connect all corporate directories into a
single directory for security management.
VI. INFORMATION SECURITY AND PAIN
PROPERTIES
PKI technology is used in the project, because of its
property of information security. Privacy, authentication,
integrity and non-repudiation services together provide
Information Security.
Privacy/Confidentiality -Data confidentiality is
designed to protect the data from disclosure attack. It is
designed to prevent snooping and traffic analysis attack. It is
provided by encrypting the message using Public key of the
receiver.
Authentication - Authentication is used to check the
authentication of the sender and receiver during the connection
establishment. It is provides by encipherment, digital signature
and authentication exchanges.
Integrity - Data Integrity security service is used to
ensure whether the integrity of the data has been preserved or
not. It is provided by signing the message using private key of
the sender and verifying the message using sender’s public key.
Non-Repudiation - Non-repudiation service protects
against repudiation by either sender or receiver of the data. In
non-repudiation with proof of origin, the receiver of the data
can later prove the identity of the sender if denied. In non-
repudiation with proof of delivery, the sender of the data can
later prove that the data were delivered to the intended recipient.
It is provided by digital signature, data integrity and
notarization.
VII. LITERATURE SURVEY
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
2
3. Literature Survey aims to review the critical points of current
knowledge including substantive findings as well as theoretical
and methodological contributions on the topic.
A. BASICS OF CRYPTOGRAPHY
Cryptography is the practice and study of techniques
for secure communication in the presence of third parties
(adversaries). It is about constructing and analyzing protocols
that overcome the influence of adversaries and which are related
to various aspects in information security such as data
confidentiality, data integrity, and authentication [6]. Modern
cryptography is heavily based on mathematical theory and
computer science practice; cryptographic algorithms are
designed around computational hardness assumptions, making
such algorithms hard to break in practice by any adversary. It is
theoretically possible to break such a system but it is infeasible
to do so by any known practical means. These schemes are
therefore termed computationally secure; theoretical advances
and faster computing technology require these solutions to be
continually adapted. Modern cryptography is based upon:
Symmetric-key cryptography
Asymmetric-key cryptography
Hash
SYMMETRIC KEY CRYPTOGRAPHY
Symmetric-key algorithms are a class of algorithms for
cryptography that use trivially related, often identical,
cryptographic keys for both encryption of plaintext and
decryption of cipher text. The encryption key is trivially related
to the decryption key, in that they may be identical or there is a
simple transformation to go between the two keys [7].The keys,
in practice, represent a shared secret between two or more
parties that can be used to maintain a private information link.
When used with asymmetric ciphers for key transfer,
pseudorandom key generators are nearly always used to
generate the symmetric cipher session keys. However, lack of
randomness in those generators or in their initialization vectors
is disastrous and has led to cryptanalytic breaks in the past.
Therefore, it is essential that an implementation uses a source of
high entropy for its initialization. A disadvantage of symmetric
key algorithms is the requirement of a shared secret key, with
one copy at each end. Since keys are subject to potential
discovery by a cryptographic adversary, they need to be
changed often and kept secure during distribution and in
service. Choosing, distributing, and storing keys without error
and without loss is difficult to reliably achieve. Cryptanalysis of
symmetric key algorithms are easier when compared to that of
asymmetric key algorithms.
ASYMMETRIC KEY CRYPTOGRAPHY
Asymmetric-key cryptography used two separate keys:
one private and one public. If the encryption and decryption are
thought of as locking and unlocking padlocks with keys, then
the padlock with keys, then the padlock that is locked with a
public key can be unlocked only with the corresponding private
key [8]. Public-key cryptography refers to a cryptographic
system requiring two separate keys, one to lock or encrypt the
plaintext, and one to unlock or decrypt the cipher text. Neither
key will do both functions. One of these keys is published or
public and the other is kept private. If the lock/encryption key is
the one published then the system enables private
communication from the public to the unlocking key's owner. If
the unlock/decryption key is the one published then the system
serves as a signature verifier of documents locked by the owner
of the private key. Thus, unlike symmetric key algorithms, a
public key algorithm does not require a secure initial exchange
of one, or more, secret keys between the sender and receiver.
These algorithms work in such a way that, while it is easy for
the intended recipient to generate the public and private keys
and to decrypt the message using the private key, and while it is
easy for the sender to encrypt the message using the public key,
it is extremely difficult for anyone to figure out the private key
based on their knowledge of the public key. The distinguishing
technique used in public key cryptography is the use of
asymmetric key algorithms, where the key used to encrypt a
message is not the same as the key used to decrypt it. Each user
has a pair of cryptographic keys―a public encryption key and a
private decryption key. The publicly available encrypting-key is
widely distributed, while the private decrypting-key is known
only to the recipient. Messages are encrypted with the
recipient's public key and can be decrypted with the
corresponding private key. The keys are related mathematically,
but parameters are chosen so that determining the private key
from the public key is prohibitively expensive [9].
The two main branches of public key cryptography are:
Public key encryption: a message encrypted with a recipient's
public key cannot be decrypted by anyone except a possessor of
the matching private key―presumably, this will be the owner of
that key and the person associated with the public key used.
This is used for confidentiality.
Digital signatures: a message signed with a sender's private
key can be verified by anyone who has access to the sender's
public key, thereby proving that the sender had access to the
private key (and therefore is likely to be the person associated
with the public key used), and the part of the message that has
not been tampered with.
HASH
Hash is the transformation of a string of characters into
a usually shorter fixed-length value or key that represents the
original string. Hashing is used to index and retrieve items in a
database because it is faster to find the item using the shorter
hashed key than to find it using the original value. It is also used
in many encryption algorithms [10].
STEGANOGRAPHY
The word Steganography means covered writing in
contrast with cryptography. Steganography means concealing
the message itself by covering it with something else [11]. The
advantage of Steganography, over cryptography alone, is that
messages do not attract attention to themselves. Plainly visible
encrypted messages-no matter how unbreakable-will arouse
suspicion, and may in them be incriminating in countries where
encryption is illegal. Therefore, whereas cryptography protects
the contents of a message, Steganography can be said to protect
both messages and communicating parties. However, it can also
pose serious problems because it is difficult to detect. Network
surveillance and monitoring systems will not flag messages or
files that contain steganographic data. Therefore, if someone
attempted to steal confidential data, they could conceal it within
another file and send it in an innocent looking email.
CRYPTOGRAPHY VS STEGANOGRAPHY
The purpose of Cryptography and Steganography is to
provide secret communication. However, Steganography is not
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
3
4. the same as cryptography. Cryptography hides the contents of a
secret message from a malicious people, whereas
Steganography even conceals the existence of the message.
Steganography must not be confused with cryptography, where
we transform the message so as to make it meaning obscure to a
malicious people who intercept it. Therefore, the definition of
breaking the system is different. In cryptography, the system is
broken when the attacker can read the secret message. Breaking
a steganographic system need the attacker to detect that
Steganography has been used and he is able to read the
embedded message. In cryptography, the structure of a message
is scrambled to make it meaningless and unintelligible unless
the decryption key is available. It makes no attempt to disguise
or hide the encoded message. Cryptography offers the ability of
transmitting information between persons in a way that prevents
a third party from reading it. Cryptography can also provide
authentication for verifying the identity of someone or
something.It is possible to combine the techniques by
encrypting message using cryptography and then hiding the
encrypted message using Steganography. The resulting stego-
image is transmitted without revealing that secret information is
being exchanged. Furthermore, even if an attacker were to
defeat the steganographic technique and detect the message
from the object, he would still require the cryptographic
decoding key to decipher the encrypted message [12].
VIII. PROGRAM MODULES
PUBLIC KEY CERTIFICATE VALIDATION
The validation of the certificate is done with the help
of the applet by checking the email id of the user and expiration
date of the certificate. This date is verified with the server date
to check if the certificate is valid. By this we validate the users
public certificate.
ALADDIN E-TOKEN ACCESS
To access the e-token we use JCE. The following is an
extract of code to access the e-token.
----------------------------------------------------------------------------
String os1=System.getProperty("os.name").toUpperCase();
if(os1.startsWith("WINDOWS"))
{ String configDir="";
if(os1.contains("Windows 9"))
configDir = System.getenv("WinDir");
else
configDir = System.getenv("SystemRoot");
String
etoken_path=configDir+"system32eTPKCS11.dll";
String pkcs11ConfigSettings="";
if(os1.equalsIgnoreCase("WINDOWS XP") ||
os1.equalsIgnoreCase("WINDOWS NT") ||
os1.equalsIgnoreCase("WINDOWS 98") ||
os1.equalsIgnoreCase("WINDOWS 2000") ||
os1.equalsIgnoreCase("WINDOWS ME"))
{
pkcs11ConfigSettings ="name = SmartCardn" + "library =
"+etoken_path;
}
else
{
pkcs11ConfigSettings = "name =
SmartCardn" + "library =
"+etoken_path+"n"+"slot=2";
}
byte[] pkcs11ConfigBytes = pkcs11ConfigSettings.getBytes();
ByteArrayInputStream confStream = new
ByteArrayInputStream(pkcs11ConfigBytes);
sun.security.pkcs11.SUNPKCS11 Class sunPkcs11Class =
Class.forName("sun.security.pkcs11.SunPKCS11");
Constructor pkcs11Constr = sunPkcs11Class.getConstructor(
Java.io.InputStream.class);
pkcs11Provider = (Provider)
pkcs11Constr.newInstance(confStream);
Security.addProvider(pkcs11Provider);
-----------------------------------------------------------------------------
First, we check if the user operating system is
windows; Sun PKCS#11 provider acts as a bridge between the
Java JCA and JCE APIs and the native PKCS#11 cryptographic
API, translating the calls and conventions between the two.
Cryptographic devices such as Smartcards and hardware
accelerators often come with software that includes a PKCS#11
implementation. For SafeNet e-token it is eTPKCS11.dll. We
add this Security provider to access the e-token.
EXTRACTING PUBLIC KEY FROM CERTIFICATE
(.CRT)
The following is an extract of code to obtain public key
from a .crt file.
-----------------------------------------------------------------------------
InputStream in=new FileInputStream("/Path/to/.crt/files");
CertificateFactory cf=CertificateFactory.getInstance("X.509");
X509Certificate -
cert=(X509Certificate)cf.generateCertificate(in);
PublicKey pk=(PublicKey)cert.getPublicKey();
-----------------------------------------------------------------------------
The variable in contains a reference to a .crt file. A
X.509 certificate instance is obtained in the variable cf and the
certificate is generated with the file stream in. The public key is
extracted from the certificate object cert using the built-in
function getPublicKey() which returns a reference of a
PublicKey object pk.
EXTRACTING PRIVATE KEY
Extracting Private Key from .p12 file on local file system.
The following is an extract of code to obtain private key from a
.pfx file on local file system.
---------------------------------------------------------------------------
KeyStore pfx = KeyStore.getInstance("pkcs12");
FileInputStream fin=new FileInputStream("path/to/private
key/certificate.p12");
char[] password="user_password".toCharArray();
pfx.load(fin,password);
fin.close();
String alias=”alias name of the .pfx file of interest”;
pfx.getCertificateChain(alias);
KeyStore.PasswordProtection pass=new
KeyStore.PasswordProtection(password);
KeyStore.PrivateKeyEntry pkEntry =
(KeyStore.PrivateKeyEntry) pfx.getEntry(alias, pass);
PrivateKey myPrivateKey = pkEntry.getPrivateKey();
----------------------------------------------------------------------------
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
4
5. Java Cryptographic extension provides a Keystore to
store private keys and certificates. A keyStore object type
pkcs12 is obtained to a variable pfx. The variable fin holds the
reference of the certificate file on the local file system. A
function load() which takes two arguments, a file reference and
the corresponding passcode to the file loads the certificate. The
alias variable holds an alias name of the certificate which helps
identify the certificate in the keystore.
The PasswordProtection object is initialized with the
passcode. Entry to the E-Token is obtained with the built-in
function getEntry() which takes two arguments, the alias and the
password. The function getPrivateKey() returns a reference to
the private key stored in the certificate.
Loading Aladdin E-token and Extracting private key
from a .p12 certificate.
The following is an extract of code to load the E-Token, and
obtain a private key from a .p12 file.
-----------------------------------------------------------------------------
KeyStore keyStore = KeyStore.getInstance("PKCS11");
String Pass=”passcode_of_e-token”;
keyStore.load(null, Pass); // loads the token.
String alias=”alias name of the .pfx file of interest”;
keyStore.getCertificateChain(alias);
KeyStore.PasswordProtection pass=new
KeyStore.PasswordProtection(password);
KeyStore.PrivateKeyEntry pkEntry =
(KeyStore.PrivateKeyEntry) keyStore.getEntry(alias, pass);
PrivateKey myPrivateKey = pkEntry.getPrivateKey();
-------------------------------------------------------------------------
Here an instance of PKCS11 keystore is obtained since
e-token are categorized under PKCS11 standards. All other
procedures to extract the private key remain the same, as
explained in the above section.
SIGNING MESSAGES
The following is an extract of code which sign a
message with SHA-512 and RSA.
-----------------------------------------------------------------------------
import Java.security.*;
privateKey =(PrivateKey) keyStore.getKey(alias_dup, null);
Signature instance =
Signature.getInstance("SHA512withRSA");
instance.initSign(privateKey);
instance.update((sign1_extra.text1).getBytes());
byte[] signature = instance.sign();
char[] signature1 = Base64Coder.encode(signature);
sign1_extra.s5=new String(signature1);
String text2=sign1_extra.text1+":"+sign1_extra.s5;
char[] c2=Base64Coder.encode(text2.getBytes());
----------------------------------------------------------------------------
The variable alias_dup is the alias name of the private
key certificate in the e-token. The variable sign1_extra.text1
contains the text which is to be digitally signed. The variable
signature contained the signed data which is encoded using
base64 encoder and stored in signature1. The original text and
the signed data are concatenated and stored in the character
array c2.
VERIFYING MESSAGES
The following is an extract of code to verify digital
signatures.
-----------------------------------------------------------------------------
import Java.security.*;
Signature
instance1=Signature.getInstance("SHA512withRSA");
instance1.initVerify(publicKey);
instance1.update(sig2_text_split.getBytes());
if(instance1.verify(sig2)){System.out.println("true");
String param=sig2_text_split;
Object[] params = {param};
verify3.browserWindow.call("f1", params);
System.exit(0);}
---------------------------------------------------------------------------
The variable sig2_text_split contains the original text.
The Signature object is initialized with the signature algorithm.
The function call verify(sig2) verifies the digital signature on
the variable sig2.
ENCRYPTING MESSAGES
Messages are encrypted with RSA algorithm.
-----------------------------------------------------------------------------
Cipher
pkcipher=Cipher.getInstance("RSA/ECB/PKCS1Padding");
pkcipher.init(Cipher.ENCRYPT_MODE, publicKey);
byte[] buffer = plaintext.getBytes("UTF-8");
byte[] encrypted = pkcipher.doFinal(buffer);
byte[] encoded = Base64Coder.encode(encrypted);
-----------------------------------------------------------------------------
The above code illustrates encrypting and encoding
plain text messages. A pkcipher is initialized with RSA in ECB
mode. The plaintext message is converted to a byte
representation of the String. The function doFinal() takes one
argument, buffer and encrypts the data in the buffer returning an
array of encrypted bytes. The encrypted bytes are encoded to
base64 format to enable the database to store the encrypted data.
DECRYPTING MESSAGES
Messages are encrypted with RSA algorithm.
-----------------------------------------------------------------------------
Cipher
pkcipher=Cipher.getInstance("RSA/ECB/PKCS1Padding");
pkcipher.init(Cipher.DECRYPT_MODE, privateKey);
byte[] bts = Base64Coder.decode(encrypted.toCharArray());
byte[] text = pkcipher.doFinal(bts);
-----------------------------------------------------------------------------
The above code decrypts an encrypted data. First the
encoded data is decoded with a base64 coder. The decoded text
is decrypted by the pkcipher initialized with the RSA algorithm
in decrypt mode. The function doFinal() returns decrypted bits.
SIGNING AND ENCRYPTING MESSAGES
The message is first digitally signed with the private
key of the sender. This signature is encrypted with the public
key of the receiver. This double encryption satisfies all
properties of PAIN.
DECRYPTING AND VERIFYING MESSAGES
This operation takes place at the receiving end.
Messages which are signed and encrypted are fed to this
operation. The secure message is first decrypted with the private
key of the receiver and the signature on the data is verified with
the public key of the sender.
IX. OUTPUTS
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
5
6. a. PKI MESSAGE HOME PAGE
b. NEW USER REGISTRATION
c. COMPOSING A TEXT MESSAGE
d. DIGITALLY SIGNING A TEXT MESSAGE
e. SELECTING A PRIVATEKEY CERTIFICATE
FROM THE KEYSTORE OF E-TOKEN
X. CONCLUSION
There is an increasing need for secure system with increase in
cyber fraud and crimes. With advancement in technology,
internet is now an alternative workspace for cloud users and
users of online project management services. Users of such
services work on data of private nature, which may be
detrimental to them if there happened to be a change in the
integrity of these data. PKI is an emerging technology based on
Asymmetric cryptography which proposes certain practices
which ensure information or data security.PKI Message service
is based on PKI and provides information security to user
messages through Privacy, Integrity, Authentication of end
users and Non-Repudiation services. PKI Message Service
ensure security of data over insure networks. PKI Message
Services’ dependence on certificates issued by CA makes it
more a reliable service. PKI Message Service proves to be
useful in the Online Banking, Online Purchasing and other areas
where security happens to be a critical concern. PKI Message
can also be embedded into social networking sites to provide a
higher level of security
XI. ACKNOWLEDGMENT
This work is to enable more security for Complex business
systems, e-Commerce and automated business transactions
who uses internet service.
XII. REFERENCES
[1].http://www.dartmouth.edu/~deploypki/overview.html
[2].http://www.dartmouth.edu/~deploypki/application.html
[3].http://www.blogs.technet.com/b/indust2006/06/438895.aspx
[4].http://www.2.dir.texas.gov/pubs/srrpubs13-providers.aspx
[5].http://www.en.wikipedia.org/wiki/certificate_authority
[8].http://www.en.wikipedia.org/wiki/Public-key_cryptography
[9].http://www.it.toolbox.com/wik/Asymmetric_key_encryption
[10].http://www.en.wikipedia.org/wiki/Cryptographic_function
[11].http://www.en.wikipedia.org/wiki/steganography
[12].http://www.vspages.com/Cryptography-vs-Steganography4
[13].http://www.technet.microsoft.com/cc77982(v=ws.10).aspx
[14].http://www.cca.gov.in/
[15].http://www.redbooks.ibm.com/redbooks/pdfs/s924978.pdf
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
6