Skip to main content

Digital Certificate-Based User Authentication to Access Networks and Hosts

  • Conference paper
  • First Online:
International Conference on Computing, Communication, Electrical and Biomedical Systems

Abstract

When an unknown person comes in freely to talk to us, I believe that the first question that pops up within us will be with their identity. Incoming host detection requests are sometimes fishy but not in all cases; we may also have some peer friend of ours outside a network who wants to connect with us; we can’t neither give complete trust on any incoming request nor decline it. How probable it is that the one who tries to connect us is a well-known entity of ours? All we need is the authenticity. Digital certificates are one of a kind that could help us with the authentication. The contents of the certificates disclose the identity of individual. Each messaging participant generates a matched pair of encryption keys—a private key, which is never revealed or transmitted, and a public key, which is freely available to other participants. These keys are stored in a local file or repository called a key store, and the public key is stored as part of a digital certificate. The certificate can be attached to a service operation to verify the sender’s identity and to provide the recipient with the means to encode a response.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bele, R.S., Mehare, J.P.: A review on digital degree certificate using blockchain technology. IJCRT. 9(2), 2320–2882 (2021)

    Google Scholar 

  2. Thabit, F., Alhomdy, S., Al-Ahdal, A.H., Jagtap, S.: A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proc. 2(1), 91–99 (2021)

    Article  Google Scholar 

  3. Vincent, O.R., Okediran, T.M., Abayomi-Alli, A.A., et al.: An identity-based elliptic curve cryptography for Mobile payment security. SN Comput. Sci. 1, 112 (2020)

    Article  Google Scholar 

  4. Kumar, K., Sasikala, K.: Comparative study of cryptographic algorithms. IJERT. 9(11), 483–488 (2020)

    Google Scholar 

  5. Haldorai, A., Ramu, A.: Security and channel noise management in cognitive radio networks. Comput. Electr. Eng. 87, 106784 (2020). https://doi.org/10.1016/j.compeleceng.2020.106784

    Article  Google Scholar 

  6. Haldorai, A., Ramu, A.: Canonical correlation analysis based hyper basis feedforward neural network classification for urban sustainability. Neural. Process. Lett. (2020). https://doi.org/10.1007/s11063-020-10327-3

  7. Qadir, A.M., Varol, N.: A review paper on cryptography. In: 2019 7th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–6. IEEE (2019)

    Google Scholar 

  8. Gahan, A.V., Geetha, D., Devanagavi, A.: Empirical study of security issues in encryption techniques. Int. J. Appl. Eng. Res.. ISSN 0973-4562. 14(5), 1049–1061 (2019)

    Google Scholar 

  9. Siswanto, B., Surgawiwaha, D.: Implementation of digital signature for research paper legalization, authentication and ratification case study: training center for national cyber and crypto agency people. Int. J. Soc. Sci. 5(2), 1003–1012 (2019) https://doi.org/10.20319/pijss.2019.52.10031012

  10. Bhanushali, H., Arthena, A., Bhadra, S., Talukdar, J.: Digital certificates using blockchain: an overview. In: 2nd International Conference on Advances in Science & Technology (ICAST) by K J Somaiya Institute of Engineering & Information Technology, Mumbai, India (2019)

    Google Scholar 

  11. Anandakumar, H., Nisha, K.: Enhanced multicast cluster-based routing protocol for delay tolerant mobile networks. Int. J. Inf. Commun. Technol. 7(6), 676 (2015)

    Google Scholar 

  12. Cheng, N., Lee, C., Chi, C., Chen, Y.: Blockchain and smart contract for digital certificate. In: IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, pp. 1046–1051. IEEE (2018)

    Chapter  Google Scholar 

  13. Huynh, T., Tru Huynh, T., Pham, D.K., Khoa Ngo, A.: Issuing and verifying digital certificates with Blockchain. In: 2018 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, pp. 332–336 (2018)

    Google Scholar 

  14. Radif, M.J.: Vulnerability and exploitation of digital certificates. In: 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT), Baghdad, Iraq, pp. 88–92 (2018)

    Google Scholar 

  15. Prakasha, K., Muniyal, B., Acharya, V., Krishna, S., Prakash, S.: Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list. Inf. Secur. J. 27(4), 214–229 (2018)

    Google Scholar 

  16. Pan, H., Lei, Y., Jian, C.: Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J. Image Video Process. 2018(1), 1–10 (2018)

    Article  Google Scholar 

  17. Mali, A., Mahalle, C., Kulkarni, M., Nangude, T., Navale, P.G.: Digital signature authentication and verification on smart phones using CR PT algorithm. IRJET. 4(5), 332–338 (2017)

    Google Scholar 

  18. Redlich, R.M., Nemzow, M.A.: Digital Information Infrastructure and Method for Security Designated Data and with Granular Data Stores. Google Patents (2017)

    Google Scholar 

  19. Xiuli, C., Zhihua, G., Ke, Y., et al.: An image encryption scheme based on three-dimensional Brownian motion and chaotic system. Chin. Phys. B. 26(2), 99–113 (2017)

    Google Scholar 

  20. Cai, Z., Huang, D.: Research on DES Data Encryption Technology in Network Information Security. Comput. Meas. Control. 25, 241–247 (2017)

    Google Scholar 

  21. Zhu, W., Lin, J.: Generating correlated digital certificates: framework and applications. IEEE Trans. Inf. Forensics Secur. 11(6), 1117–1127 (2016)

    Article  Google Scholar 

  22. Usman, A., Awwalu, J., Kamil, B.: User authentication in securing communication using Digital Certificate and public key infrastructure. Int. J. Comput. Trends Technol. 37, 22–25 (2016)

    Google Scholar 

  23. Bahade, A.Y.: Generation of Digital Certificate x.509 v3 using Elliptic Curve Cryptography(ECC) & RSA: A Comparative Study & OpenSSL code Revisited, Int. J. Adv. Eng. Res. Dev. 2(3), 168–173 (2015)

    Google Scholar 

  24. S. Vanstone: Next generation security for wireless: elliptic curve cryptography. Comput. & Sec. 22(5) 412–415 (2003)

    Google Scholar 

  25. Schukat, M., Cortijo, P.: Public key infrastructures and digital certificates for the Internet of things. In: 26th Irish Signals and Systems Conference (ISSC), Carlow, Ireland, pp. 1–5. IEEE (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ramesh, K., Ganeshkumar, P., Gokul, B., Sharma, K.Y. (2022). Digital Certificate-Based User Authentication to Access Networks and Hosts. In: Ramu, A., Chee Onn, C., Sumithra, M. (eds) International Conference on Computing, Communication, Electrical and Biomedical Systems. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-86165-0_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86165-0_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86164-3

  • Online ISBN: 978-3-030-86165-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics