Article Preview
Top1. Introduction
The Public Key Infrastructure (PKI) is a technology which enables clients to maintain level of trust by providing security services. A public key infrastructure (PKI) is the combination of software, hardware, key generation, encryption technologies, certificate generation processes, and services that enable an organization to secure its communications and business transactions (Toorani, Mohsen & Beheshti, 2008; Jachtoma, 2006). PKI enables secure communications and business transactions by the exchange of digital certificates between authenticated users and trusted resources (Ijaz, 2012; Vatra, 2010). When deploying data on Internet the most important security services required are authentication, confidentiality, message integrity and non-repudiation. To meet these requirements there is a technology called Public Key Infrastructure. When Alice wants to use Bob’s public key, she uses certificates issued by a CA. The CA signs the certificate with its private key and Alice verifies the signature using the public key of the CA. PKI can meet these security services with its techniques and standards.
PKI is an enabler of trust that provides,
- •
Strong user identification
- •
Confidential communication
- •
Data integrity
- •
Evidence for non-repudiation
Certificate Authority is a trusted authority that issues certificates with its private key and verifies digital entity’s identity on the Internet.
Negi (Negi and Arvind, 2015) proposed digital signature algorithm which is based on factoring the product of two large prime numbers and discrete logarithms problem. The limitation of this scheme is that it do not allow to store digital signature certificates.
Wang, Bai & Hu, 2015 has proposed an approach of multiple signatures where process of certification is to be performed unless it is found that any of the CA is compromised. Hence authentication mechanism is not secure as we have proposed.
In paper Approach towards Digital Signature for e-Governance in India (Jain, 2015) eSign are stored on HSM, where smart card can be lost.
We proposed an approach that not only having strong authentication but also better than the Wang’s concept, explained in section 4 under security analysis.
Our main objective is to provide strong authentication and reduce the time waste in issuance of fraudulent certificates. It also analyzed some of the attacks on CAs and tries to resolve them.
Wang has only described the fraudulent certificates and did not explain the attacks that can be done on certificate authorities. Proposed algorithm considers attack on CAs and is more secure as compared to Wang’s concept because of the following features:
- •
Strong Authentication: Proposed approach fetched the information from the database and Unique Identification Authority of India Server(UIDAI) verifies the information. Certification process only starts after verification of identities, if a fake identity is used for certificate request, that is detected in the initial phase..
- •
Prevents DoS Attack: The proposed approach used timestamp to avoid Dos attack. if timestamp expires, Server can ignore that request.
- •
Avoid MITM Attack: As we have used Trusted Server who avoid and prevents fraud done by mediators.
get certificates from the RCA, RCA verifies
whenever request come from 