User authentication in securing communication using Digital Certificate and public key infrastructure

Author(s):  
Usman Abubakar Idris ◽  
◽  
Jamilu Awwalu ◽  
Buhari kamil
2021 ◽  
Vol 5 (6) ◽  
pp. 1161-1170
Author(s):  
Valen Brata Pranaya ◽  
Theophilus Wellem

The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.  


2019 ◽  
Vol 48 (1) ◽  
pp. 14-22
Author(s):  
Krishna Prakasha ◽  
Balachandra Muniyal ◽  
Vasundhara Acharya

Purpose The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value The proposed research work is an efficient and enhanced user authentication mechanism.


2015 ◽  
Vol 2015 ◽  
pp. 1-9
Author(s):  
Jung-oh Park ◽  
Sanggeun Kim

Recently, as the utilization of CCTV (closed circuit television) is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), andR value(random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.


2020 ◽  
Author(s):  
M Khan

The large-scale utilization of biometric authentication systems creates a demand for effective and reliable security and privacy of its data. Biometric data is not secret and if compromised, it can have catastrophic effects on the integrity of the whole verification system. To address these issues, this paper presents a novel encryption and watermarking method by using public key infrastructure for the secure transmission of biometric data over network. Encryption is applied on the biometric template before embedding as a watermark to make it more secure and robust and then, it is hid into the cover image. Experimental results show that the security, performance, and accuracy of the presented method is encouraging comparable with the other methods found in the current literature.


2011 ◽  
Vol 271-273 ◽  
pp. 1136-1141
Author(s):  
Yong Li Ma

A number of serious security issues have already occurred with the rapid deployment of electronic transaction. One approach to guaranteeing security is the public key infrastructure (PKI). PKI provides a structure of trust among its users or principals. However there are serious PKI implementation issues as different countries and different organizations may adopt different security policies and implementations. This raises the question of interoperation between these various implementations. In the paper, the author proposes a new solution using VA (Validation Authority) to achieve the digital certificate validation and resolve the general PKI interoperation problem.


2020 ◽  
Author(s):  
M Khan

The large-scale utilization of biometric authentication systems creates a demand for effective and reliable security and privacy of its data. Biometric data is not secret and if compromised, it can have catastrophic effects on the integrity of the whole verification system. To address these issues, this paper presents a novel encryption and watermarking method by using public key infrastructure for the secure transmission of biometric data over network. Encryption is applied on the biometric template before embedding as a watermark to make it more secure and robust and then, it is hid into the cover image. Experimental results show that the security, performance, and accuracy of the presented method is encouraging comparable with the other methods found in the current literature.


Author(s):  
Wagner Junqueira de Araújo ◽  
Yasmin Brito de Lemos Vieira

Com a utilização dos documentos em formato digital, foi necessário desenvolver tecnologias que garantissem a autenticação e o sigilo destes. Uma das tecnologias que habilitam tais características nos documentos digitais é a certificação digital que, por sua vez, é oferecida pelas autoridades certificadoras (ACs). Esta comunicação descreve resultado de pesquisa que teve como objetivo identificar e comparar os produtos e serviços oferecidos por diferentes autoridades certificadoras distribuídas pelo mundo. Descreve as estruturas das Autoridades Certificadoras (ACs) e seu papel no processo de certificação digital, como a responsável pela emissão dos certificados e as Autoridades de Registro que verificam a autenticidade das informações contidas no certificado. Apresenta os tipos de ACs e quais as principais Autoridades Certificadoras do Brasil, credenciadas pela Infraestrutura de Chaves Públicas Brasileira (ICP-Brasil).  Trata-se de uma pesquisa qualitativa, que utilizou a análise documental como método para coleta e análise de conteúdo para tabulação e análise. A amostra foi composta por quarenta e quatro ACs, distribuídas em doze países. Como resultado, são apresentados dois quadros, que indicam os produtos de certificação digital prestados pelas ACs no Brasil e pelas internacionais. Faz uma descrição dos produtos e serviços por elas oferecidos, e o detalhamento e a aplicação de cada um. Verificou-se que os produtos e serviços oferecidos são similares entre as ACs mundo a fora e no Brasil, as diferenças estão nos certificados emitidos para finalidades específicas, como os que foram criados para atender serviços como o e-CPF, e-CNPJ, Conectividade Social, etc.Abstract With the use of digital documents, it was necessary to develop technologies that would guarantee the authentication and the confidentiality of these. One technology that enables such features in digital documents are the digital certification that, in turn, offered by certification authorities (CAs). This paper describes results of research that aimed to identify and compare the products and services offered by different certificate authorities distributed around the world. Describes the structures of Certification Authorities (CAs) and its role in digital certification process, as responsible for the issuance of licenses and registration authorities that verify the authenticity of the information contained in the certificate. Presents the types of CAs and what are the mains Certification Authorities in Brazil, accredited by the Brazilian Public Key Infrastructure (PKI-Brazil). A qualitative study used the document analysis as a method for collection and content analysis for tabulation and analysis. The sample consisted of forty-four ACs, distributed in twelve countries. As a result, there are two tables, which show the digital certification of products provided by CAs in Brazil and international. Makes a description of products and services offered by them, and the detailing and the application of each. Was verified that the products and services offered are similar among CAs outside and inside, the differences are the certificates issued for specific purposes, such as those created in Brazil to attend services with e-CPF, e-CNPJ, Social Connectivity, etc.KeywordsSecurity Information Management. Certification Authority. Digital certificate. Digital certification services.


Sign in / Sign up

Export Citation Format

Share Document