scholarly journals Comparação entre produtos e serviços oferecidos pelas Autoridades Certificadoras

Author(s):  
Wagner Junqueira de Araújo ◽  
Yasmin Brito de Lemos Vieira

Com a utilização dos documentos em formato digital, foi necessário desenvolver tecnologias que garantissem a autenticação e o sigilo destes. Uma das tecnologias que habilitam tais características nos documentos digitais é a certificação digital que, por sua vez, é oferecida pelas autoridades certificadoras (ACs). Esta comunicação descreve resultado de pesquisa que teve como objetivo identificar e comparar os produtos e serviços oferecidos por diferentes autoridades certificadoras distribuídas pelo mundo. Descreve as estruturas das Autoridades Certificadoras (ACs) e seu papel no processo de certificação digital, como a responsável pela emissão dos certificados e as Autoridades de Registro que verificam a autenticidade das informações contidas no certificado. Apresenta os tipos de ACs e quais as principais Autoridades Certificadoras do Brasil, credenciadas pela Infraestrutura de Chaves Públicas Brasileira (ICP-Brasil).  Trata-se de uma pesquisa qualitativa, que utilizou a análise documental como método para coleta e análise de conteúdo para tabulação e análise. A amostra foi composta por quarenta e quatro ACs, distribuídas em doze países. Como resultado, são apresentados dois quadros, que indicam os produtos de certificação digital prestados pelas ACs no Brasil e pelas internacionais. Faz uma descrição dos produtos e serviços por elas oferecidos, e o detalhamento e a aplicação de cada um. Verificou-se que os produtos e serviços oferecidos são similares entre as ACs mundo a fora e no Brasil, as diferenças estão nos certificados emitidos para finalidades específicas, como os que foram criados para atender serviços como o e-CPF, e-CNPJ, Conectividade Social, etc.Abstract With the use of digital documents, it was necessary to develop technologies that would guarantee the authentication and the confidentiality of these. One technology that enables such features in digital documents are the digital certification that, in turn, offered by certification authorities (CAs). This paper describes results of research that aimed to identify and compare the products and services offered by different certificate authorities distributed around the world. Describes the structures of Certification Authorities (CAs) and its role in digital certification process, as responsible for the issuance of licenses and registration authorities that verify the authenticity of the information contained in the certificate. Presents the types of CAs and what are the mains Certification Authorities in Brazil, accredited by the Brazilian Public Key Infrastructure (PKI-Brazil). A qualitative study used the document analysis as a method for collection and content analysis for tabulation and analysis. The sample consisted of forty-four ACs, distributed in twelve countries. As a result, there are two tables, which show the digital certification of products provided by CAs in Brazil and international. Makes a description of products and services offered by them, and the detailing and the application of each. Was verified that the products and services offered are similar among CAs outside and inside, the differences are the certificates issued for specific purposes, such as those created in Brazil to attend services with e-CPF, e-CNPJ, Social Connectivity, etc.KeywordsSecurity Information Management. Certification Authority. Digital certificate. Digital certification services.

2021 ◽  
Vol 5 (6) ◽  
pp. 1161-1170
Author(s):  
Valen Brata Pranaya ◽  
Theophilus Wellem

The validity of the routing advertisements sent by one router to another is essential for Internet connectivity. To perform routing exchanges between Autonomous Systems (AS) on the Internet, a protocol known as the Border Gateway Protocol (BGP) is used. One of the most common attacks on routers running BGP is prefix hijacking. This attack aims to disrupt connections between AS and divert routing to destinations that are not appropriate for crimes, such as fraud and data breach. One of the methods developed to prevent prefix hijacking is the Resource Public Key Infrastructure (RPKI). RPKI is a public key infrastructure (PKI) developed for BGP routing security on the Internet and can be used by routers to validate routing advertisements sent by their BGP peers. RPKI utilizes a digital certificate issued by the Certification Authority (CA) to validate the subnet in a routing advertisement. This study aims to implement BGP and RPKI using the Bird Internet Routing Daemon (BIRD). Simulation and implementation are carried out using the GNS3 simulator and a server that acts as the RPKI validator. Experiments were conducted using 4 AS, 7 routers, 1 server for BIRD, and 1 server for validators, and there were 26 invalid or unknown subnets advertised by 2 routers in the simulated topology. The experiment results show that the router can successfully validated the routing advertisement received from its BGP peer using RPKI. All invalid and unknown subnets are not forwarded to other routers in the AS where they are located such that route hijacking is prevented.  


Author(s):  
Swante Adi Krisna ◽  
Hari Purwadi

Notary's concept as Registration Authority has been facilitated by Indonesian law, for example Law Number 2 Year 2014 About Amendment to Law Number 30 Year 2004 Concerning Notary Public, which explains that "other authorities regulated in legislation", the authority to certify electronic transactions (Cyber notary), make a Deed of pledge of waqf, and mortgage of aircraft. In addition to Law Number 2 Year 2014 on Amendment to Law Number 30 of 2004 concerning Notary Public, Notary's role as Registration Authority is also described in Government Regulation Number 82 Year 2012 Concerning the Implementation of Electronic Transaction System and Transaction, especially in the explanation Article 59 Paragraph (5) explaining that the Ministerial Regulation contains, among other things, arrangements on the procedure of applying for electronic certification which can be submitted through a notary. In contrast to the notary role concept as the Registration Authority, the notary role concept as a subordinate certification authority is not possible because of various obstacles.


2011 ◽  
Vol 271-273 ◽  
pp. 1136-1141
Author(s):  
Yong Li Ma

A number of serious security issues have already occurred with the rapid deployment of electronic transaction. One approach to guaranteeing security is the public key infrastructure (PKI). PKI provides a structure of trust among its users or principals. However there are serious PKI implementation issues as different countries and different organizations may adopt different security policies and implementations. This raises the question of interoperation between these various implementations. In the paper, the author proposes a new solution using VA (Validation Authority) to achieve the digital certificate validation and resolve the general PKI interoperation problem.


2002 ◽  
Author(s):  
Αθηνά Μπούρκα

Το ευρύτερο πεδίο ενδιαφέροντος της παρούσας διατριβής σχετίζεται με την ασφάλεια εφαρμογών βάσει ευέλικτων και επεκτάσιμων υλοποιήσεων σε XML, καθώς επίσης και με την ανάπτυξη και δια-λειτουργικότητα Υποδομών Δημόσιου Κλειδιού (Public Key Infrastructure - PKI) για το τομέα της Ιατρικής Φροντίδας. Με τον όρο «ασφάλεια εφαρμογών» αναφέρονται οι βασικές απαιτήσεις για: εμπιστευτικότητα και ακεραιότητα των δεδομένων, αναγνώριση και αυθεντικοποίηση των εμπλεκομένων οντοτήτων, μη άρνηση αποστολής/λήψης πληροφορίας, καθώς επίσης και διαθεσιμότητα των προσφερόμενων υπηρεσιών [1][2][3]. Τα τελευταία χρόνια οι Υποδομές Δημόσιου Κλειδιού (ΥΔΚ) αποτελούν ένα διαδεδομένο και αξιόπιστο μέσο κάλυψης των παραπάνω απαιτήσεων, λειτουργώντας ως ένα ευρύτερο πλαίσιο εμπιστοσύνης και παρέχοντας υπηρεσίες υποβάθρου για εκτέλεση κρυπτογραφικών μηχανισμών (π.χ. κρυπτογράφηση δεδομένων, ψηφιακή υπογραφή). Οι κύριες υπηρεσίες ΥΔΚ περιλαμβάνουν την Εγγραφή και Πιστοποίηση της ταυτότητας των εμπλεκομένων οντοτήτων, τη Διαχείριση κρυπτογραφικών κλειδιών, το Κατάλογο διάθεσης κλειδιών και πιστοποιητικών, κλπ. [4][5]. Οι παραπάνω υπηρεσίες παρέχονται στα πλαίσια μιας ΥΔΚ από την Έμπιστη Τρίτη Οντότητα (ΕΤΟ) ή αλλιώς Πάροχο Υπηρεσιών Εμπιστοσύνης με πυρήνα την Αρχή Πιστοποίησης (Certification Authority - CA) [6], Κατά τη διαδικασία αυτή, ιδιαίτερα σημαντικό ρόλο παίζει το προφίλ πιστοποιητικών της ΥΔΚ και η αρχιτεκτονική της δομή, τα οποία καθορίζονται στη Πολιτική Πιστοποιητικού [7]. Οι υπηρεσίες ΥΔΚ διατίθενται σήμερα σε αρκετούς επιχειρησιακούς τομείς και μέσω του διαδικτύου, παρέχοντας τα βασικά μέσα (π.χ. κλειδιά, αλγορίθμους, κλπ.) για την περαιτέρω υλοποίηση μηχανισμών ασφαλείας σε επίπεδο εφαρμογών τελικών χρηστών. […]


Author(s):  
П.Б. Хорев ◽  
А.М. Тихомиров

Для обеспечения безопасности информационных систем часто используется инфраструктура открытых ключей. Технология Blockchain представляет собой способ организации хранения информации о различных событиях и характеризуется публичностью и надежностью. При использовании технологии блокчейн информация защищена от модификации или удаления, а также всегда может быть верифицирована. На основе технологий PKI и Blockchain можно создать защищенную образовательную сеть доверия. В статье предлагаются методы и программные средства создания и сопровождения удостоверяющего центра и журнала транзакций для участников образовательной сети доверия. Public key infrastructure (PKI) is often used to ensure the security of information systems. Blockchain technology is a way of storing information about various events and is characterized by publicity and reliability. With blockchain technology, information is protected from modification or deletion and can always be verified. Using PKI and Blockchain technologies, you can create a secure educational trust network. The article proposes methods and software tools to create and maintain a certification authority and transaction log for members of the educational trust network.


Sign in / Sign up

Export Citation Format

Share Document