By Topic

Replacement of components in public key infrastructures

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
M. Hartmann ; Inst. for Comput. Algebra, Distributed Syst. & Cryptography, Tech. Univ. of Darmstadt, Germany ; S. Maseberg

Public key infrastructures play an important role in secure electronic communication via the internet. Governments, companies and customers use this technology to a high degree and trust in the provided security, but public key infrastructures have risks. On the one hand it is not proven that the mathematical problems on the hardness of which public key cryptography depends are really hard to solve. On the other hand failures in implementations are not out of the question. Since most of the modern public key infrastructures support only one signature algorithm, breaking it would hurt authenticity and integrity of, as well as confidence in, transmitted data and therefore effect the breakdown of the entire infrastructure. Such a breakdown would imply costly consequences for business and society. In this article we present a public key infrastructure which can, in case of the breaking of an algorithm, be repaired with a new cryptosystem, and thus conserve its functionality

Published in:

Industrial Electronics Society, 2001. IECON '01. The 27th Annual Conference of the IEEE  (Volume:3 )

Date of Conference: