Font Size: a A A

Using Web Service In Public Key Infrastructure

Posted on:2005-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:P ChenFull Text:PDF
GTID:2168360125453009Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the population of computing technology and networks, people find it necessary and urgent to resolve the security problem. Those who using the computing network need a safe environment that have a character of confidentiality, data integrity, authentication and non-repudiation. The PKI(Public Key Infrastructure) system can meet these security needs. PKI is a kind of secure infrastructure that based on the asymmetric encryption technology. CA(Certification Authority) is the core of this system. By issuing digital certificate to users, CA can resolve the secure problem. Users can present their certificate to others to prove their identity. With the help of encryption algorithms, users who have certificate can communicate with each other securely. In such secure system, we need CA's root certificate to authenticate the certification.Web service technology is used to make the program over the net interact with each other fluently. It used XML(extensible Markup Language) to ensure that programs on different platform can call each other. People are now impressed with the over-platform ability of web service technology. At the same time, people pay more attention on the secure problem of web service. Recently, web service security standard is published. This implies that now people are beginning to resolve the secure problem of the web service technology. This is good news and will be sure to make the web service more popular. With this background, we begin to study the technology of PKI and web service, and use the tools such as Java, c language to realize a simple PKI system. Further on, we deploy a web service based on the PKI system. Using this web service, we can access the certificate pools through the Internet. So we can put the function of accessing certificate into our programs. And this is just what we are doing. At the end of this paper, we use this web service in a secure email system.
Keywords/Search Tags:PKI, Web Service, secure email
PDF Full Text Request
Related items