DESIGN OF IDENTITY BASED PUBLIC KEY INFRASTRUCTURE
<p align="justify">Public key infrastructure has become a security system requirement in business and government processes with the development of internet technology and has been <br /> <br /> mandated in Information and Electronic Transaction Act and also System Adminis...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/31899 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | <p align="justify">Public key infrastructure has become a security system requirement in business and government processes with the development of internet technology and has been <br />
<br />
mandated in Information and Electronic Transaction Act and also System Administration and Electronic Transactions Regulation. The absence of a standard <br />
<br />
public key infrastructure model from the government makes a problem in Indonesia's Certificate Authority root development. In fact Certificate Authority <br />
<br />
management requires complex regulation and expensive for digital certificate. The solution that can solve the problem is by using an identity-based public key <br />
<br />
infrastructure model so that entity authentication can be accounted for. The entity's identity can be publicly known and can be used as its public key value. Certificate Authority doesn’t needs to publish the validity of the public key. <br />
<br />
Development of a public key infrastructure model designed using the design research method that focuses on design solutions to problems. The design of the <br />
<br />
public key infrastructure model will be implemented using the secure socket layer architecture that allows the writer to analyze the design implementation. This <br />
<br />
research aims to get the design and implementation of public key infrastructure based on identity by utilizing secure socket layer architecture. Based on the <br />
<br />
experimental scenarios, the implementation model of an identity-based public key infrastructure requires 0.5 seconds for the encryption process and 2.7 seconds for <br />
<br />
the decryption process with an average memory requirement of ~ 42-53 KB.<p align="justify"> |
---|