Abstract
Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.
Original language | English |
---|---|
Title of host publication | Cyber Security - Proceedings of CSI 2015 |
Publisher | Springer Verlag |
Pages | 415-425 |
Number of pages | 11 |
ISBN (Print) | 9789811085352 |
DOIs | |
Publication status | Published - 01-01-2018 |
Event | 50th Annual Convention of the Computer Society of India: Cyber Security, CSI 2015 - Delhi, India Duration: 02-12-2015 → 05-12-2015 |
Publication series
Name | Advances in Intelligent Systems and Computing |
---|---|
Volume | 729 |
ISSN (Print) | 2194-5357 |
Conference
Conference | 50th Annual Convention of the Computer Society of India: Cyber Security, CSI 2015 |
---|---|
Country | India |
City | Delhi |
Period | 02-12-15 → 05-12-15 |
Fingerprint
All Science Journal Classification (ASJC) codes
- Control and Systems Engineering
- Computer Science(all)
Cite this
}
Design and implementation of a secure hierarchical trust model for PKI. / Tanwar, Sarvesh; Prema, K. V.
Cyber Security - Proceedings of CSI 2015. Springer Verlag, 2018. p. 415-425 (Advances in Intelligent Systems and Computing; Vol. 729).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
TY - GEN
T1 - Design and implementation of a secure hierarchical trust model for PKI
AU - Tanwar, Sarvesh
AU - Prema, K. V.
PY - 2018/1/1
Y1 - 2018/1/1
N2 - Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.
AB - Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.
UR - http://www.scopus.com/inward/record.url?scp=85046799177&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85046799177&partnerID=8YFLogxK
U2 - 10.1007/978-981-10-8536-9_39
DO - 10.1007/978-981-10-8536-9_39
M3 - Conference contribution
AN - SCOPUS:85046799177
SN - 9789811085352
T3 - Advances in Intelligent Systems and Computing
SP - 415
EP - 425
BT - Cyber Security - Proceedings of CSI 2015
PB - Springer Verlag
ER -