3,419 research outputs found

    Security Issues of the Digital Certificates within Public Key Infrastructures

    Get PDF
    The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance, a research paper has mentioned how a PKI security may be violated by MD5 collision over information from the certificates. In order to develop further studies on the topic a serious knowledge about certificate structure is necessary.digital certificates, certificates authority, ASN.1 DER/BER, PKI

    The Submission of Fiscal Declarations by Electronic Means of Transmission at Distance

    Get PDF
    The unprecedented development of information technology in the past few years has made possible the transmission of information, inclusively fiscal information, by electronic means of transmission at distance. Tax payers can use the method of submission of fiscal declarations by electronic means of transmission at distance as alternative method of deposition of fiscal declarations. The date of deposition of a fiscal declaration is the date of its registration on the site of the Ministry of Economy and Finances, A.N.A.F. portal. The declaration submitted by electronic means is presumed to be signed by the person authorized to sign fiscal declarations, whose signature was attached to the declaration, according to the used digital certificate. The issue of simple and qualified certificates is done by the suppliers of services of certification administered by the National Authority for the Settlement in Communications and Information Technology. The period of validity of a certificate is of maximum 1 year from the date of communication by the client. In case of renewal of a qualified certificate there is issued a new certificate with the same identification and checking data of the electronic signature, as the other validity data. For the submission of fiscal declarations by electronic means of transmission at distance, tax payers should use the service “Depose on-line declarations” existing on the MMSF site, on A.N.A.F. portal.fiscal declarations, electronic means of transmission, digital certificate

    The Role of Digital Certificates in EGoverning. The Case of the Romanian Regulation and Surveillance Authority

    Get PDF
    The implementation of electronic governance related projects implies user authentication,accounts activation and personal data verification. Certain public services, particularly thoseinvolving financial transactions or statements, require a high security level. The use of the PKI technology and, consequently, of digital signatures, constitutes the most viable solution, meeting the required security standards, protecting, on the one hand, the signatory’s identity, and, on the other hand, the integrity of the transmitted message. Due to the use of the digital certificate, the development of online public services is now possible, especially since it meets the requirements of security standards, but also because it is highly trusted by users. This article intends to analyze the impact of the digital certificate on the improvement of communication between state authorities, including specific transactional relations, and also to consider its influence on security improvement of dataflow. The study demonstrates that the digital certificate is closely connected to the information society, directly determining the dynamics of the development of new applications that provide a better interface between the state and its citizens

    Security in Internet

    Get PDF
    A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.Internet, Intranet, security, digital certificate, uthentication, confidentiality, nonrepudiation, integrity control, firewall, router

    University authentication system based on Java card and digital X.509 certificate

    Get PDF
    This article presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality, integrity and non repudiation

    Research on Authentication Technology of E-Commerce

    Get PDF
    With the continuous development of society and the requirements of economic integration, E-commerce is becoming a major economic model in the market , But it is facing a huge security problem in the course of its development。 In this paper it is starting from overview on e-commerce and problems to be solved on development of e-commerce :authentication is a technology of the most basic to ensure the e-commerce transactions, Then it is discoursed the development of e-commerce authentication technology, It is a digital certificate, And center of the digital certificate is a CA technology , Main technical departments and their function for CA technology is PAA,RA,CP and PKI, Third it is discoursed main basis technology of the CA system technology,Including digital envelope and digital signature and dual digital signature , Detailed analysis their working principle ,In the end I analyze direction for future research of e-commerce authentication technology: The dynamic password of the mobile phone software is most likely to be one of the large-scale popularization of the next generation of internet authentication technology
    • …
    corecore