Affiliation:
1. University of Kashmir, India
Abstract
Information security has been the focus of research since decades; however, with the advent of Internet and its vast growth, online information security research has become recurrent. Novel methods, techniques, protocols, and procedures are continuously developed to secure information from growing threats. Digital signature certificates, currently offers one of the most trusted solutions to achieve CIA-trio for online information. This chapter discusses online information security through cryptography. It explains digital signature certificates; their benefits, the underlying standards, involved techniques, procedures, algorithms, processes, structure, management, formats, and illustration of their working. It highlights the potential of digital signatures and certificates in information security across different devices, services, and applications. It introduces a few useful tools to learn, train, and implement digital signature certificates.
Reference162 articles.
1. Adams, C., Pinkas, D., Cain, P., & Zuccherato, R. (2001). Internet X.509 Public Key Infrastructure Time Stamp Protocols (TSP). IETF RFC 3161, Retrieved from http://www.ietf.org/rfc/rfc3161.txt
2. Molecular Computation of Solutions to Combinatorial Problems
3. Adobe. (2012). Retrieved from http://blogs.adobe.com/security/2012/09/inappropriate-use-of-adobe-code-signing-certificate.html
4. Al-Riyami, S. S. Paterson, K. G. (2013). Certificateless Public Key Cryptography. Academic Press.
5. Allma, E. Callas, J. Delan, M. Libbey, M. Fenton J. Thomas, M. (2007). DomainKeys Identified Mail (DKIM). Internet Engineering Task Force (IETF), RFC 4871.