Abstract
When an unknown person comes in freely to talk to us, I believe that the first question that pops up within us will be with their identity. Incoming host detection requests are sometimes fishy but not in all cases; we may also have some peer friend of ours outside a network who wants to connect with us; we can’t neither give complete trust on any incoming request nor decline it. How probable it is that the one who tries to connect us is a well-known entity of ours? All we need is the authenticity. Digital certificates are one of a kind that could help us with the authentication. The contents of the certificates disclose the identity of individual. Each messaging participant generates a matched pair of encryption keys—a private key, which is never revealed or transmitted, and a public key, which is freely available to other participants. These keys are stored in a local file or repository called a key store, and the public key is stored as part of a digital certificate. The certificate can be attached to a service operation to verify the sender’s identity and to provide the recipient with the means to encode a response.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bele, R.S., Mehare, J.P.: A review on digital degree certificate using blockchain technology. IJCRT. 9(2), 2320–2882 (2021)
Thabit, F., Alhomdy, S., Al-Ahdal, A.H., Jagtap, S.: A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transitions Proc. 2(1), 91–99 (2021)
Vincent, O.R., Okediran, T.M., Abayomi-Alli, A.A., et al.: An identity-based elliptic curve cryptography for Mobile payment security. SN Comput. Sci. 1, 112 (2020)
Kumar, K., Sasikala, K.: Comparative study of cryptographic algorithms. IJERT. 9(11), 483–488 (2020)
Haldorai, A., Ramu, A.: Security and channel noise management in cognitive radio networks. Comput. Electr. Eng. 87, 106784 (2020). https://doi.org/10.1016/j.compeleceng.2020.106784
Haldorai, A., Ramu, A.: Canonical correlation analysis based hyper basis feedforward neural network classification for urban sustainability. Neural. Process. Lett. (2020). https://doi.org/10.1007/s11063-020-10327-3
Qadir, A.M., Varol, N.: A review paper on cryptography. In: 2019 7th International Symposium on Digital Forensics and Security (ISDFS), pp. 1–6. IEEE (2019)
Gahan, A.V., Geetha, D., Devanagavi, A.: Empirical study of security issues in encryption techniques. Int. J. Appl. Eng. Res.. ISSN 0973-4562. 14(5), 1049–1061 (2019)
Siswanto, B., Surgawiwaha, D.: Implementation of digital signature for research paper legalization, authentication and ratification case study: training center for national cyber and crypto agency people. Int. J. Soc. Sci. 5(2), 1003–1012 (2019) https://doi.org/10.20319/pijss.2019.52.10031012
Bhanushali, H., Arthena, A., Bhadra, S., Talukdar, J.: Digital certificates using blockchain: an overview. In: 2nd International Conference on Advances in Science & Technology (ICAST) by K J Somaiya Institute of Engineering & Information Technology, Mumbai, India (2019)
Anandakumar, H., Nisha, K.: Enhanced multicast cluster-based routing protocol for delay tolerant mobile networks. Int. J. Inf. Commun. Technol. 7(6), 676 (2015)
Cheng, N., Lee, C., Chi, C., Chen, Y.: Blockchain and smart contract for digital certificate. In: IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, pp. 1046–1051. IEEE (2018)
Huynh, T., Tru Huynh, T., Pham, D.K., Khoa Ngo, A.: Issuing and verifying digital certificates with Blockchain. In: 2018 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, pp. 332–336 (2018)
Radif, M.J.: Vulnerability and exploitation of digital certificates. In: 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT), Baghdad, Iraq, pp. 88–92 (2018)
Prakasha, K., Muniyal, B., Acharya, V., Krishna, S., Prakash, S.: Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list. Inf. Secur. J. 27(4), 214–229 (2018)
Pan, H., Lei, Y., Jian, C.: Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J. Image Video Process. 2018(1), 1–10 (2018)
Mali, A., Mahalle, C., Kulkarni, M., Nangude, T., Navale, P.G.: Digital signature authentication and verification on smart phones using CR PT algorithm. IRJET. 4(5), 332–338 (2017)
Redlich, R.M., Nemzow, M.A.: Digital Information Infrastructure and Method for Security Designated Data and with Granular Data Stores. Google Patents (2017)
Xiuli, C., Zhihua, G., Ke, Y., et al.: An image encryption scheme based on three-dimensional Brownian motion and chaotic system. Chin. Phys. B. 26(2), 99–113 (2017)
Cai, Z., Huang, D.: Research on DES Data Encryption Technology in Network Information Security. Comput. Meas. Control. 25, 241–247 (2017)
Zhu, W., Lin, J.: Generating correlated digital certificates: framework and applications. IEEE Trans. Inf. Forensics Secur. 11(6), 1117–1127 (2016)
Usman, A., Awwalu, J., Kamil, B.: User authentication in securing communication using Digital Certificate and public key infrastructure. Int. J. Comput. Trends Technol. 37, 22–25 (2016)
Bahade, A.Y.: Generation of Digital Certificate x.509 v3 using Elliptic Curve Cryptography(ECC) & RSA: A Comparative Study & OpenSSL code Revisited, Int. J. Adv. Eng. Res. Dev. 2(3), 168–173 (2015)
S. Vanstone: Next generation security for wireless: elliptic curve cryptography. Comput. & Sec. 22(5) 412–415 (2003)
Schukat, M., Cortijo, P.: Public key infrastructures and digital certificates for the Internet of things. In: 26th Irish Signals and Systems Conference (ISSC), Carlow, Ireland, pp. 1–5. IEEE (2015)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ramesh, K., Ganeshkumar, P., Gokul, B., Sharma, K.Y. (2022). Digital Certificate-Based User Authentication to Access Networks and Hosts. In: Ramu, A., Chee Onn, C., Sumithra, M. (eds) International Conference on Computing, Communication, Electrical and Biomedical Systems. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-86165-0_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-86165-0_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-86164-3
Online ISBN: 978-3-030-86165-0
eBook Packages: EngineeringEngineering (R0)