1 Abstract- With the globalization in the e-commerce, where everything is digital and is done online, may it be online shopping, money transfer, e-banking, e-votin g, e- registration, sending email, security is the main priority. Reliance on electronic communications makes information vulnerable to unauthorized users. He nce the users need confidentiality, message integrity, send er non-repudiation and sender and authentication. P ublic Key Infrastructure provides these services. And it ensu re that public keys are public keys are securely, c onveniently and efficiently are distributed. There are many typ es of PKI implementations. A X.509 certificate bind s a name to public key value. The role of certificate is to associate a public key with the identity contained in the X.509 certificate. In this paper we are discussing the im plementation of certificate X.509, how it is genera ted and stored in database and retrieved when required.
[1]
Ray Hunt,et al.
PKI and digital certification infrastructure
,
2001,
Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..
[2]
Matthew J. Warren,et al.
PKI - Advantages and Obstacles
,
2004,
AISM.
[3]
Natasa Prohic.
Public Key Infrastructures - PGP vs. X.509
,
2005
.
[4]
S. F. Al-Janabi,et al.
Development of Certificate Authority services for web applications
,
2012,
2012 International Conference on Future Communication Networks.
[5]
Ed Gerck.
Overview of Certification Systems: X.509, Pkix, Ca, Pgp & Skip
,
.