Reference Hub9
A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority

A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority

Sarvesh Tanwar, Anil Kumar
Copyright: © 2017 |Volume: 11 |Issue: 3 |Pages: 14
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522511755|DOI: 10.4018/IJISP.2017070101
Cite Article Cite Article

MLA

Tanwar, Sarvesh, and Anil Kumar. "A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority." IJISP vol.11, no.3 2017: pp.1-14. http://doi.org/10.4018/IJISP.2017070101

APA

Tanwar, S. & Kumar, A. (2017). A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority. International Journal of Information Security and Privacy (IJISP), 11(3), 1-14. http://doi.org/10.4018/IJISP.2017070101

Chicago

Tanwar, Sarvesh, and Anil Kumar. "A Proposed Scheme for Remedy of Man-In-The-Middle Attack on Certificate Authority," International Journal of Information Security and Privacy (IJISP) 11, no.3: 1-14. http://doi.org/10.4018/IJISP.2017070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

PKI offers authentication via digital certificates, which are signed and provided by Certificate Authority (CA). A certificate can be signed by single CA or multiple CAs. A document signed by multiple CAs has less probability to be forged as compared to signed by a single CA. CA is a single point of failure, if CA issue forged certificate intentionally or maliciously the whole PKI system effected. Still PKI ensures a secure method for exchanging sensitive information over unsecured channels through the use of cryptographic public private key pair, issued by Certification Authority (CA) but even an honest CA can issue forged certificate. Now in India everything is digitalized to enable e-Governance. For that a unique identity, aadhar number issued by Unique Identification Authority of India (UIDAI) is most widely used. For avoiding fraudulent certificates, strong authentication and attacks on CAs, the authors proposed an algorithm that use multiple signature on certificate based on aadhar number offered by UIDAI for online entity authentication-verification before issuing the certificate. If any of the CA is compromised whether its database or key will not be able to issue certificate to any server as authentication fails and multiple signatures are required. Proposed concept is more secure than the existing in terms of authentication, security and time.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.