Design and implementation of a secure hierarchical trust model for PKI

Sarvesh Tanwar, K. V. Prema

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.

Original languageEnglish
Title of host publicationCyber Security - Proceedings of CSI 2015
PublisherSpringer Verlag
Pages415-425
Number of pages11
ISBN (Print)9789811085352
DOIs
Publication statusPublished - 01-01-2018
Event50th Annual Convention of the Computer Society of India: Cyber Security, CSI 2015 - Delhi, India
Duration: 02-12-201505-12-2015

Publication series

NameAdvances in Intelligent Systems and Computing
Volume729
ISSN (Print)2194-5357

Conference

Conference50th Annual Convention of the Computer Society of India: Cyber Security, CSI 2015
CountryIndia
CityDelhi
Period02-12-1505-12-15

Fingerprint

Cryptography

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Tanwar, S., & Prema, K. V. (2018). Design and implementation of a secure hierarchical trust model for PKI. In Cyber Security - Proceedings of CSI 2015 (pp. 415-425). (Advances in Intelligent Systems and Computing; Vol. 729). Springer Verlag. https://doi.org/10.1007/978-981-10-8536-9_39
Tanwar, Sarvesh ; Prema, K. V. / Design and implementation of a secure hierarchical trust model for PKI. Cyber Security - Proceedings of CSI 2015. Springer Verlag, 2018. pp. 415-425 (Advances in Intelligent Systems and Computing).
@inproceedings{e533d4021d104ac0bc4dfd4cea57d977,
title = "Design and implementation of a secure hierarchical trust model for PKI",
abstract = "Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.",
author = "Sarvesh Tanwar and Prema, {K. V.}",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/978-981-10-8536-9_39",
language = "English",
isbn = "9789811085352",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "415--425",
booktitle = "Cyber Security - Proceedings of CSI 2015",
address = "Germany",

}

Tanwar, S & Prema, KV 2018, Design and implementation of a secure hierarchical trust model for PKI. in Cyber Security - Proceedings of CSI 2015. Advances in Intelligent Systems and Computing, vol. 729, Springer Verlag, pp. 415-425, 50th Annual Convention of the Computer Society of India: Cyber Security, CSI 2015, Delhi, India, 02-12-15. https://doi.org/10.1007/978-981-10-8536-9_39

Design and implementation of a secure hierarchical trust model for PKI. / Tanwar, Sarvesh; Prema, K. V.

Cyber Security - Proceedings of CSI 2015. Springer Verlag, 2018. p. 415-425 (Advances in Intelligent Systems and Computing; Vol. 729).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Design and implementation of a secure hierarchical trust model for PKI

AU - Tanwar, Sarvesh

AU - Prema, K. V.

PY - 2018/1/1

Y1 - 2018/1/1

N2 - Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.

AB - Public-Key Infrastructure (PKI) provides the authenticity of the public keys for a particular user. The public key is embedded in Digital Certificates. Therefore we tried to develop a specialized Hierarchical Trust Model. In this digital certificates are created using RSA of 2048 bits for key generation and combination of symmetric and asymmetric cryptography for the purpose of the security. As RSA is not suitable for large message encryption, we used AES-128 bit symmetric key for signing the information. The private key is stored locally on Machine, that is why sensitive information is stored as attributes of an Object. The object of a class is converted into Byte Array. This Byte Array is stored in BLOB data type of the database. The data is retrieved from MySQL database from BLOB data type field. This Byte Array is then converted into an object. The required data is extracted from the object.

UR - http://www.scopus.com/inward/record.url?scp=85046799177&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85046799177&partnerID=8YFLogxK

U2 - 10.1007/978-981-10-8536-9_39

DO - 10.1007/978-981-10-8536-9_39

M3 - Conference contribution

SN - 9789811085352

T3 - Advances in Intelligent Systems and Computing

SP - 415

EP - 425

BT - Cyber Security - Proceedings of CSI 2015

PB - Springer Verlag

ER -

Tanwar S, Prema KV. Design and implementation of a secure hierarchical trust model for PKI. In Cyber Security - Proceedings of CSI 2015. Springer Verlag. 2018. p. 415-425. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-981-10-8536-9_39