Sök:

Rekommendationer för införande av public key infrastructure


The use of insecure networks -such as the Internet- to send and receive information has made the need for preventing unauthorised people reading it yet more important. One of the easiest way to do this is through public key cryptography. However, the problem with this solution is how to tie a specific public key to a certain subject. This is solved by letting a trusted third party issue a certificate that holds, as a minimum, the name of the subject and the subject's public key along with the issuer's digital signature on the information. The rules we make for issuing, revoking and verifying of certificates and the entities that are being used to do so are called PKI - Public Key Infrastructure. In this thesis we shall se what PKI really is in a more detailed way and which entities it constitutes of. We will also investigate some of the areas in which we could make use of it, for instance secure e-mail and virtual private networks. Next, we will look into some of the drawbacks with PKI and what you should think of in order to aviod these. Finally, we'll give recommendations for the implementation itself. As for the theory of cryptography, the basics is presented to the interested reader in a separate appendix.

Författare

Johan Andersson

Lärosäte och institution

Linköpings universitet/Institutionen för systemteknik

Nivå:

"Uppsats för yrkesexamina på grundnivå". Självständigt arbete (examensarbete)om minst 15 högskolepoäng utfört för att erhålla yrkesexamen på grundnivå.

Läs mer..