TY - GEN
T1 - Design and implementation of a secure hierarchical trust model for PKI
AU - Tanwar, Sarvesh
AU - Prema, K. V.
PY - 2018/1/1
Y1 - 2018/1/1
N2 - Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.
AB - Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.
UR - http://www.scopus.com/inward/record.url?scp=85046799177&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85046799177&partnerID=8YFLogxK
U2 - 10.1007/978-981-10-8536-9_39
DO - 10.1007/978-981-10-8536-9_39
M3 - Conference contribution
AN - SCOPUS:85046799177
SN - 9789811085352
T3 - Advances in Intelligent Systems and Computing
SP - 415
EP - 425
BT - Cyber Security - Proceedings of CSI 2015
PB - Springer Verlag
T2 - 50th Annual Convention of the Computer Society of India: Cyber Security, CSI 2015
Y2 - 2 December 2015 through 5 December 2015
ER -