Font Size: a A A

A Method Of PKI Private Key Management Research

Posted on:2005-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:H W XuFull Text:PDF
GTID:2168360152955446Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With e-business and e-government development, The traditional cryptography technology can't keep up with the needs of network application. The main problem is identification and difficulty of key management. But PKI can solve the problem.In PKI System, CA provide certificates to management the public key, while the private key is protected by other sides such as the KEA(Key Escrow Agent) or managed by self. In fact, The smart card is widely used. Though the smart card can be used conveniently, the hardware cost is high, especially if the life of private key is short, managing them is very difficult. With the next internet coming, the more often is the e-business, the more important is the key security. From above the private key management will have directly impact on the development of e-business, a better method is in needs immediately.In general key management, there are some problems such as the depending on manager strongly, the risk of only saving key on one place and updating key in a certain term. The EBC(Enterprise Box Client) method can not only less the risk of every process in key management but also keep up with the next internet development. This method can make the probability of important data accessing illegally lest because the private key that will be encrypt is saved in E(Enterprise), the key that is used encrypting private key is saved in B(Box), the decryption process only exist in C(Client). So the private key only can be access by the user. The EBC method can make key management more conveniently, better support key management remotely, less the risk of the only saving key on one place anddepending on manager strongly. In all, the EBC method can make the probability of key accessing illegally lest.This paper firstly analyze the risk of every process of key management in theory, then explain how to avoid them and put up with a set of security policies. What's more, the paper also provide a set of designing of total and sub details. Last the paper give a risk assessment about every entity. Then it also prove the EBC method is usable by programming at last.
Keywords/Search Tags:PKI, Box, RSA, CA, Private Key Management
PDF Full Text Request
Related items