全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Discussion on Different Authentication Mechanisms of PKI and CPK System

DOI: 10.4236/oalib.1108460, PP. 1-10

Subject Areas: Information and Communication: Security, Privacy, and Trust

Keywords: PKI, CPK, Authentication, Trust, Evidence, Logic, Cyber

Full-Text   Cite this paper   Add to My Lib

Abstract

Subject authentication is the core technology of cyber security. There are two existing technologies: one is PKI public key system based on trust logic, another is CPK public key system based on truth logic. In this paper, the different characteristics of trust-based PKI and evidence-based CPK different mechanisms were discussed from Four aspects: decentralized or centralized key generation, trust-based or evidence-based authentication logic, different usages of DSS signature protocol, and functions and performances under different mechanism. Decentralized system has too strong exclusivity, which is easy to be used by criminal groups and gangdoms. Both PKI and CPK can transform DSS signature into digital signature, but there is a serious gap in performance under different logic. Trust logic is the product of the situation that cannot prove subject authenticity. The method of certificate increases the amount of information and the burden of certificate verification.

Cite this paper

Nan, X. (2022). Discussion on Different Authentication Mechanisms of PKI and CPK System. Open Access Library Journal, 9, e8460. doi: http://dx.doi.org/10.4236/oalib.1108460.

References

[1]  Department of Defense (DOD) (2021) Zero Trust Reference Architecture, Version 1.0.
[2]  President’s Information Technology Advisory Committee (2005) Cyber Security. A Crisis of Prioritization. A Report to President.
[3]  Clay, W. (2004) Information Warfare and Cyber War: Capabilities and Related Policy Issues, CRS Report for Congress.
[4]  Brurros, M., Abadi, M. and Needham, R. (1990) A Logic of Authentication. ACM SIGOPS Operating Systems Review, 23, 1-13. https://doi.org/10.1145/74850.74852
[5]  Nan, X.H. (2006) CPK on Identifier Authentication. Publishing House of Defense Industry.
[6]  National Institute of Standards and Technology, INST PUB 186, Digital Signature Standards, U.S. Department of Commerce 1994.
[7]  Nan, X.H. (2020) GAP One-Step Protocol. Communication Technology, 53.

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413