期刊名称:International Journal of Computer Science and Network Security
印刷版ISSN:1738-7906
出版年度:2015
卷号:15
期号:5
页码:55-59
出版社:International Journal of Computer Science and Network Security
摘要:Public Key Infrastructure methods consists of a group of policies, processes, server platforms, software and workstations which is used for the purpose of administering certificates and maintaining pairs of public-private keys. These pair of keys is able to issue, maintain, and revoke public key certificates. The goal of a Public Key Infrastructure (PKI) is to ensure secure, convenient and efficient discovery of public keys. There are various types of PKI that are deployed. This discussion is centred on X.509 certificate, creation of certificate, revocation of certificate, its authentication procedures and PGP certificates. The goal of this analysis is to highlight the differences between both systems and to provide the reasons for their usage