brief description of each
1. process used in PKI
2. process of revocation in PKI
3. digital signature
4. digital certificate
1) Process used in PKI :
a) PKI stands for "Public key infrastructure". PKI provides distribution , revocation and verification of public key used for public key encryption. PKI gives user and and systems ability to securely transmit data over internet and verify the legitimacy of entities holding certificate like Webservers.
b) PKI has several different elements for effective use. CA (Certificate Authority) is used to authenticate digital identities of entities.
c) RA (Registration Authority) which is authorized by certificate authority . It provides digital certificates to user.
d) Certificate history and information is also kept securely which is called certificate store.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------
2) Process of revocation in PKI :
Certificates are revoked when private key gets compromised. Certificate revocation involves adding the revoked certificate's serial number to blacklist. This black list is called as CRL (Certificate Revocation List).
Below are the reasons for certificate revocation :
a) When It is thought that private key of certificate is compromised .
b) It is discovered that CA has issued certificate improperly.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------
3) Digital Signature :
Digital Signature is type of asymmetric cryptography. Digital signature is method which tells user if a message sent over insecure channel is trusted and sent by genuine sender.Digital signature scheme typically have below algorithms
a) Signing algorithm which takes a message and private key as a input and provides a signed document.
b) Signature verifying algorithm which takes a public key and signature as a input and tell whether to accept message or reject.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------
4) Digital Certificate :
Digital certificates are electronic certificate which consists of name , serial number , expiration date , copy of certificate holder's public key , digital signature of certificate issuing authority. There are three classes of certificates :
a) Class 1 : it defines that the certificate do not hold any legal validity as the validation process involves email only .
b) Class 2 : Person's identity is verified against trusted , pre-verified database.
c) Class 3 : Person physically visits RA (Registration Authority) and proves his identity.
the process used in PKI
process of revocation in PKI
digital signature
digital certificate
brief description of each 1. process used in PKI 2. process of revocation in PKI 3....
Questions 1. List the development steps for an RFP process. Provide a brief description of each step and describe which step you feel is most critical and explain why. 2. Describe three benefits of a long term partnership when outsourcing work. Do you believe outsourcing is beneficial for a small company? Explain why or why not. 3. List two major contract types. For each contract type, provide three examples where these contracts may be used in the real world.
SEED Labs-PKI Lalb 2 Lab Tasks 2.1 Task 1: Becoming a Certificate Authority (CA) A Certificate Authority (CA) is a trusted entity that issues digital certificates. The digital certificate cert fes the ownership of a public key by the named subject of the certificate. A number of commercial CAs are treated as root CAs; VeriSign is the largest CA at the time of writing. Users wbo want to get digital certificates issued by the commercial CAs need to pay those...
Outline the basic steps of the market research process and provide a brief description of each step. (Explain each of Hofstede’s five dimensions of national culture. Identify a country outside of North America and evaluate it according to the five dimensions. Justify your reasoning. Describe the five characteristics of innovations. How do these characteristics affect the rate at which innovations are adopted? Describe an example of each characteristic. What is expropriation? Compare and contrast confiscation, nationalization, and creeping expropriation
Brief description of observations of bacterial growth of your unknown: 2. Brief Description of Gram Stain Procedure: Description of observations of Gram Stain of your unknown: Gram Reaction: OdOtOR Morphology: KCO 3. Description of the procedure of the enzyme test you performed on your unknown. State which organisms it can differentiate between:
What three methodologies were used to assess gene expression? Give a brief description of each methodology (the principle of the methodology, not a summary of the actual experiment performed). What is/are the primary advantage(s) of each method? (15 marks)
a brief description with examples 1. fuzzing 2. secure coding concepts 3. cross site scripting(xss) 4. cross site request forgery
1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...
For " Zoho Analytics Business Intelligence (BI) tool" write a brief description for each of the following:- 1- Advantages 2-Disadvantages 3- Benefits to the organization
To explain the role securitisation played in the 2008 crisis, 1,Brief description of the US household market. 2,Explain the originate to distribute model 3,Explain of the securitisation process
Write a brief process description explaining something that you do well. In explaining the process, you are giving instructions so that others can follow the process. Identify the key steps and describe each step in order, from first to last. Choose anything you feel comfortable with explaining: cooking a favorite meal, changing a tire, performing a task at work, hosting a party, or catching a fish. The possibilities are endless! (250 words minimum)