Abstract

In Digital world all type of information are moved around the whole world in the digital form. Securities of these digital data are very necessary from the intruder, enemies, and unauthorized individuals for any government and non-government organizations. Security is the protection against danger, criminals and loss. There are many features to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. Cryptography is one essential feature for secure communications. There are two techniques are used in cryptography one is secret key cryptography and another is public key cryptography. A PKI does not a particular business function; it is providing a foundation for other security services. The primary function of a PKI is to allow the distribution and use of public keys and certificates with security and integrity. The components of public key infrastructure are certification authority (CA), certificate revocation, registration authority (RA) and digital certificate. PKI contain complete information and identifications of there sender and receiver for authentication. In the basis of these identities PKI provide certificates and authentication for secure communication. In this paper study different components of PKI and there uses for secure any type of data. This paper presents the performance of a secure application for private organizations that offers services to both owner and other members of the same organization. The primary focus of this paper is better implementation of PKI with the help of there algorithms. Index Terms: Security, Cryptography, Encryption, Decryption, Public key, Private key, Public Key Infrastructure (PKI), Digital Certificate, Certification Authority (CA), Revocation, Registration Authority (RA).

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.