User authentication in securing communication using Digital Certificate and public key infrastructure

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-37 Number-1
Year of Publication : 2016
Authors : Usman Abubakar Idris, Jamilu Awwalu, Buhari kamil
  10.14445/22312803/IJCTT-V37P105

MLA

Usman Abubakar Idris, Jamilu Awwalu, Buhari kamil "User authentication in securing communication using Digital Certificate and public key infrastructure". International Journal of Computer Trends and Technology (IJCTT) V37(1):22-25, July 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Security threats are becoming more issues of concern for e-commerce, financial institution to cloud computing and network application. These papers introduce an application of user authentication which combine Digital Certificate (DC) and Public Key Infrastructure (PKI), including securing electronic transaction and data flow control. The main purpose of this paper is to solve the problems of transferring data across the network, such as phishing, eavesdropping, snooping, sniffing, modification and masquerading.

References
[1] (Brien, M.O. & Weir, G.R.S., Understanding digital certificates. , pp.1–9.
[2] Requirement, F. & May, I.T., 2007. Understanding Digital Certificates & Secure Sockets Layer. , (May).
[3] Huang, J. et al., 2008. Theoretical analysis of issuing mechanism in distributive digital Certificate Revocation List. Proceedings of the 2008 International Conference on Computer and Electrical Engineering, ICCEE 2008, pp.199–203.
[4] Lee, D.L. & Deng, L.Y., 2008. Digital certificate mobile agent technologies in distance learning. Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp.1474–1479.
[5] Fan, K., Zhang, S. & Mo, W., 2009. A digital certificate application scheme in content protection system for high definition digital interface. 5th International Conference on Information Assurance and Security, IAS 2009, 2, pp.395– 398.
[6] Harn, L. & Ren, J., 2011. Generalized digital certificate for user authentication and key establishment for secure communications. IEEE Transactions on Wireless Communications, 10(7), pp.2372–2379.
[7] Boettcher, B.J. V & Powell, A., Digital Certificates. , pp.1– 10.
[8] Masamoto, H. & Yoshida, Y., Creating a Safe and Secure Network Society Using Digital Certificates and PKI Technology. . 2015. . [ONLINE] Available at: https://www.nttreview.
jp/archive/ntttechnical.php?contents=ntr200803le1. pdf&mode=show_pdf. [Accessed 17 March 2015] [9] Diffie, W. and Hellman, M.E., ―New Directions in Cryptography, IEEE Transactions on Information Theory, 22(1976), pp. 644-654 (9)
[10] An Ethernet Security Development Platform. 2015. An Ethernet Security Development Platform. [ONLINE] Available at: http://www.designreuse. com/articles/5583/an-ethernet-security-developmentplatform. html. [Accessed 16 March 2015].
[11] CIS 9771 Special Topics in Information Technologies - Networked Information Systems Security. 2015. CIS 9771 Special Topics in Information Technologies - Networked Information Systems Security [ONLINE] Available at: http://cisnet.baruch.cuny.edu/holowczak/classes/9771/encr yption/#. [Accessed 16 March 2015].
[12] Chapter 1. Introduction to Public-Key Cryptography. 2015. Chapter 1. Introduction to Public-Key Cryptography. [ONLINE] Available at: https://access.redhat.com/documentation/en- US/Red_Hat_Certificate_System_Common_Criteria_Certif ication/8.1/html/Deploy_and_Install_Guide/Introduction_t o_Public_Key_Cryptography.html. [Accessed 16 March 2015].

Keywords
digital certificate, Public key infrastructure (PK1), authentication.