Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list

Krishna Prakasha, Balachandra Muniyal, Vasundhara Acharya, Suyash Krishna, Smriti Prakash

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Public key cryptography is widely used for secure data transfer in various applications. The Public key infrastructure provides a foundation that supports public key cryptography, and it is required to deliver the public keys to existing systems or users securely. The public key is exchanged digitally in the form of digital certificates having a certain period of validity. Circumstances may arise under which the validity of the certificates should be ceased, and they need to be revoked. The fast growth of e-commerce demands verification and data transfers to be done in minimum time to maintain high efficiency of communication. In this paper, a new method of developing certificate revocation lists is proposed. The formal model of enhanced PKI for mobile commerce security is put forward. The performance of NTRU is compared with the RSA algorithm and the ElGamal algorithm. The paper also sets forth a comparative analysis of the proposed method with other existing techniques. The results show that the proposed technology has the upper hand over the current methods.

Original languageEnglish
Pages (from-to)214-229
Number of pages16
JournalInformation Security Journal
Volume27
Issue number4
DOIs
Publication statusPublished - 04-07-2018

Fingerprint

Public key cryptography
Data transfer
Mobile commerce
Communication
Cryptography

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Science Applications
  • Information Systems and Management

Cite this

Prakasha, Krishna ; Muniyal, Balachandra ; Acharya, Vasundhara ; Krishna, Suyash ; Prakash, Smriti. / Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list. In: Information Security Journal. 2018 ; Vol. 27, No. 4. pp. 214-229.
@article{1b019c0a37cb4fe98b0d50b82e7f02f6,
title = "Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list",
abstract = "Public key cryptography is widely used for secure data transfer in various applications. The Public key infrastructure provides a foundation that supports public key cryptography, and it is required to deliver the public keys to existing systems or users securely. The public key is exchanged digitally in the form of digital certificates having a certain period of validity. Circumstances may arise under which the validity of the certificates should be ceased, and they need to be revoked. The fast growth of e-commerce demands verification and data transfers to be done in minimum time to maintain high efficiency of communication. In this paper, a new method of developing certificate revocation lists is proposed. The formal model of enhanced PKI for mobile commerce security is put forward. The performance of NTRU is compared with the RSA algorithm and the ElGamal algorithm. The paper also sets forth a comparative analysis of the proposed method with other existing techniques. The results show that the proposed technology has the upper hand over the current methods.",
author = "Krishna Prakasha and Balachandra Muniyal and Vasundhara Acharya and Suyash Krishna and Smriti Prakash",
year = "2018",
month = "7",
day = "4",
doi = "10.1080/19393555.2018.1516836",
language = "English",
volume = "27",
pages = "214--229",
journal = "Information Security Journal",
issn = "1939-3555",
publisher = "Taylor and Francis Ltd.",
number = "4",

}

Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list. / Prakasha, Krishna; Muniyal, Balachandra; Acharya, Vasundhara; Krishna, Suyash; Prakash, Smriti.

In: Information Security Journal, Vol. 27, No. 4, 04.07.2018, p. 214-229.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list

AU - Prakasha, Krishna

AU - Muniyal, Balachandra

AU - Acharya, Vasundhara

AU - Krishna, Suyash

AU - Prakash, Smriti

PY - 2018/7/4

Y1 - 2018/7/4

N2 - Public key cryptography is widely used for secure data transfer in various applications. The Public key infrastructure provides a foundation that supports public key cryptography, and it is required to deliver the public keys to existing systems or users securely. The public key is exchanged digitally in the form of digital certificates having a certain period of validity. Circumstances may arise under which the validity of the certificates should be ceased, and they need to be revoked. The fast growth of e-commerce demands verification and data transfers to be done in minimum time to maintain high efficiency of communication. In this paper, a new method of developing certificate revocation lists is proposed. The formal model of enhanced PKI for mobile commerce security is put forward. The performance of NTRU is compared with the RSA algorithm and the ElGamal algorithm. The paper also sets forth a comparative analysis of the proposed method with other existing techniques. The results show that the proposed technology has the upper hand over the current methods.

AB - Public key cryptography is widely used for secure data transfer in various applications. The Public key infrastructure provides a foundation that supports public key cryptography, and it is required to deliver the public keys to existing systems or users securely. The public key is exchanged digitally in the form of digital certificates having a certain period of validity. Circumstances may arise under which the validity of the certificates should be ceased, and they need to be revoked. The fast growth of e-commerce demands verification and data transfers to be done in minimum time to maintain high efficiency of communication. In this paper, a new method of developing certificate revocation lists is proposed. The formal model of enhanced PKI for mobile commerce security is put forward. The performance of NTRU is compared with the RSA algorithm and the ElGamal algorithm. The paper also sets forth a comparative analysis of the proposed method with other existing techniques. The results show that the proposed technology has the upper hand over the current methods.

UR - http://www.scopus.com/inward/record.url?scp=85054713894&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85054713894&partnerID=8YFLogxK

U2 - 10.1080/19393555.2018.1516836

DO - 10.1080/19393555.2018.1516836

M3 - Article

AN - SCOPUS:85054713894

VL - 27

SP - 214

EP - 229

JO - Information Security Journal

JF - Information Security Journal

SN - 1939-3555

IS - 4

ER -