Design and implementation of a secure hierarchical trust model for PKI

Sarvesh Tanwar, K. V. Prema

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.

Original languageEnglish
Title of host publicationCyber Security - Proceedings of CSI 2015
PublisherSpringer Verlag
Pages415-425
Number of pages11
ISBN (Print)9789811085352
DOIs
Publication statusPublished - 01-01-2018
Event50th Annual Convention of the Computer Society of India: Cyber Security, CSI 2015 - Delhi, India
Duration: 02-12-201505-12-2015

Publication series

NameAdvances in Intelligent Systems and Computing
Volume729
ISSN (Print)2194-5357

Conference

Conference50th Annual Convention of the Computer Society of India: Cyber Security, CSI 2015
CountryIndia
CityDelhi
Period02-12-1505-12-15

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Tanwar, S., & Prema, K. V. (2018). Design and implementation of a secure hierarchical trust model for PKI. In Cyber Security - Proceedings of CSI 2015 (pp. 415-425). (Advances in Intelligent Systems and Computing; Vol. 729). Springer Verlag. https://doi.org/10.1007/978-981-10-8536-9_39