The main features of the public key infrastructure
Trust is the basis of any communication, whether it is built in the physical world or in the digital environment. Establishing trust in the physical world does not pose any particular challenges because communication subjects can identify each other through biometric features, identity card or other...
Saved in:
Published in | Radiotekhnika no. 214; pp. 17 - 25 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
29.09.2023
|
Online Access | Get full text |
Cover
Loading…
Abstract | Trust is the basis of any communication, whether it is built in the physical world or in the digital environment. Establishing trust in the physical world does not pose any particular challenges because communication subjects can identify each other through biometric features, identity card or other identification documents. In the digital environment, a number of difficulties arise for the identification and authentication procedure. The communicating parties do not meet face-to-face and can be at a significant distance from each other. As a result, they cannot identify uniquely and verify each other's identity using the identity verification methods used in the material world. To ensure the security of electronic communications, it is necessary for communication systems to be equipped with technical means of information protection and an additional mechanism that will contribute to the establishment of trust between the parties to the communication. The Public Key Infrastructure is used to solve problems related to trust, authentication, identity, and security on a network. A digital certificate is a fundamental element for establishing trust in the digital world. It plays a crucial role in ensuring security and identification on the Internet and when working with electronic resources. The Public Key Infrastructure is a trusted system used to ensure the security and privacy of information across networks and platforms. This system is based on public key cryptography. It implements the management of public keys and digital certificates of various entities, such as companies, corporations, organizations, individuals, websites, servers, etc. The Public Key Infrastructure is widely deployed in government portals and systems. It is used in the electronic government system to guarantee the transparency of the provision of electronic services and to ensure the security of communication links between authorities and society. The Public Key Infrastructure represents a multifaceted structure that includes a set of standards, technologies, and procedures for managing, storing, and distributing keys and digital certificates. A certificate authority is a key component of a public key infrastructure and is an independent third party that manages digital certificates. Various technical and cryptographic means of information security are used in the Public Key Infrastructure, such as digital signatures, encryption, hash functions, hardware security modules, key management software, etc. The main purpose of this article is to analyze the main features and aspects of public key infrastructure. |
---|---|
AbstractList | Trust is the basis of any communication, whether it is built in the physical world or in the digital environment. Establishing trust in the physical world does not pose any particular challenges because communication subjects can identify each other through biometric features, identity card or other identification documents. In the digital environment, a number of difficulties arise for the identification and authentication procedure. The communicating parties do not meet face-to-face and can be at a significant distance from each other. As a result, they cannot identify uniquely and verify each other's identity using the identity verification methods used in the material world. To ensure the security of electronic communications, it is necessary for communication systems to be equipped with technical means of information protection and an additional mechanism that will contribute to the establishment of trust between the parties to the communication. The Public Key Infrastructure is used to solve problems related to trust, authentication, identity, and security on a network. A digital certificate is a fundamental element for establishing trust in the digital world. It plays a crucial role in ensuring security and identification on the Internet and when working with electronic resources. The Public Key Infrastructure is a trusted system used to ensure the security and privacy of information across networks and platforms. This system is based on public key cryptography. It implements the management of public keys and digital certificates of various entities, such as companies, corporations, organizations, individuals, websites, servers, etc. The Public Key Infrastructure is widely deployed in government portals and systems. It is used in the electronic government system to guarantee the transparency of the provision of electronic services and to ensure the security of communication links between authorities and society. The Public Key Infrastructure represents a multifaceted structure that includes a set of standards, technologies, and procedures for managing, storing, and distributing keys and digital certificates. A certificate authority is a key component of a public key infrastructure and is an independent third party that manages digital certificates. Various technical and cryptographic means of information security are used in the Public Key Infrastructure, such as digital signatures, encryption, hash functions, hardware security modules, key management software, etc. The main purpose of this article is to analyze the main features and aspects of public key infrastructure. |
Author | Bodnia, M.O. Ponomar, V.A. Yesina, M.V. |
Author_xml | – sequence: 1 givenname: M.O. surname: Bodnia fullname: Bodnia, M.O. – sequence: 2 givenname: M.V. orcidid: 0000-0002-1252-7606 surname: Yesina fullname: Yesina, M.V. – sequence: 3 givenname: V.A. orcidid: 0000-0001-5271-2251 surname: Ponomar fullname: Ponomar, V.A. |
BookMark | eNotj8tqwzAUREVJoW6aD-jOP2BXuley5GUJfUGgG--FJF9R08QOkr3I39dpu5phOAyce7YZp5EYexS8Rm5QP6W5Bg5YYw1C1hxuWAHaNJVSoDas4NKoyrQa7tgu58FzAbzVgsuCQfdF5ckNYxnJzUuiXE6xnNfxvPjjEMpvupTDGJPLc1rClXhgt9EdM-3-c8u615du_14dPt8-9s-HKhgFlet5AERhUAqiJpL3UUavRGtIQ4it7tGDbxqnNZEMDlopNKGmSISixy0Tf7chTTknivachpNLFyu4_dW2abZXbYt21bZr-wFLC018 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.30837/rt.2023.3.214.02 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2786-5525 |
EndPage | 25 |
ExternalDocumentID | 10_30837_rt_2023_3_214_02 |
GroupedDBID | AAYXX CITATION M~E |
ID | FETCH-LOGICAL-c852-ad0c23318341ee6febbf4fb5198e72cf97d3b2b66a77ee4ca29417e37efee31d3 |
ISSN | 0485-8972 |
IngestDate | Tue Jul 01 01:08:17 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 214 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c852-ad0c23318341ee6febbf4fb5198e72cf97d3b2b66a77ee4ca29417e37efee31d3 |
ORCID | 0000-0002-1252-7606 0000-0001-5271-2251 |
OpenAccessLink | http://rt.nure.ua/article/download/297799/290702 |
PageCount | 9 |
ParticipantIDs | crossref_primary_10_30837_rt_2023_3_214_02 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-09-29 |
PublicationDateYYYYMMDD | 2023-09-29 |
PublicationDate_xml | – month: 09 year: 2023 text: 2023-09-29 day: 29 |
PublicationDecade | 2020 |
PublicationTitle | Radiotekhnika |
PublicationYear | 2023 |
SSID | ssib012097104 ssib050737205 ssib047832531 ssib025649415 ssib005608135 |
Score | 1.8486886 |
Snippet | Trust is the basis of any communication, whether it is built in the physical world or in the digital environment. Establishing trust in the physical world does... |
SourceID | crossref |
SourceType | Index Database |
StartPage | 17 |
Title | The main features of the public key infrastructure |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS-wwEA-iFy-iqLz3_CAHT0rzukmatEcRZRH8QNbFW0nTCW8Ru7LuyYN_u5Om3dblCeqlLKEMm53fTn6T-SLkSEkbZ-jtREYifZMDoyIDJTqusbKxzpS2Icv3Wg3v5eVD8tBNpqurS-YFs6__rSv5iVZxDfXqq2S_odmFUFzAz6hffKKG8fllHT-ha3_ioO7P-dJG_Jvm1fgH9dlWMxO6xDbNQ1ouemfKyXQOj_-qyWPnlk_LKuTPXrEb1t2ovkyqZnW8WL31BREhQXvMTln_AoELn-3Q3DIEOyPTJEqzMEGHQb3GdaqiJAk1yQ0E-ED2LF2ouGzOzPDesjUWSO98QHjmc1a5YIKhCBbz7uhpw-1LJ9IiTxA9lFpIPpvnXkQuchSR--ahaxz9Aj-y4urtvDMoChlOx_98XbDu-ZtI72TW8x-lRnuWdGFQ5MZ-aE-d9tr-KCESXn-Lv8sb6XGZHikZbZKNxpugpwEaW2QFqm3CERbUw4K2sKBTRxEWNMCCIizoR1jskNHF-ehsGDWjMSKbJjwyZWy58OZYDgCUg6Jw0hXIxlPQ3LpMl6LghVJGawBpDcdtaxAaHIAYlGKXrFbTCn4RqjIwBmzGPVHh2iHjNg69Zu20AKXgNzlu95g_hwYo-adq-fOdl_fIegfHfbKKW4YDZHjz4rDW6jufIEPb |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+main+features+of+the+public+key+infrastructure&rft.jtitle=Radiotekhnika&rft.au=Bodnia%2C+M.O.&rft.au=Yesina%2C+M.V.&rft.au=Ponomar%2C+V.A.&rft.date=2023-09-29&rft.issn=0485-8972&rft.eissn=2786-5525&rft.issue=214&rft.spage=17&rft.epage=25&rft_id=info:doi/10.30837%2Frt.2023.3.214.02&rft.externalDBID=n%2Fa&rft.externalDocID=10_30837_rt_2023_3_214_02 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0485-8972&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0485-8972&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0485-8972&client=summon |