Download Now Free registration required
Dependence on a Public Key Infrastructure (PKI) is the prominent obstructer in the path of following a public key cryptography widespread, which is held together among various users. In order to ensure authenticated communication, encryption and signature key pair must be generated by each senders and receivers. Apart from this, request along with the proof of identity should also be submitted to the Certificate Authority (CA) and receive CA-Signed certificates, so that it can be used to authenticate one another and exchange encrypted message while limitations of this is that it consumes more time and is error-prone as well. So to get rid of this menace users need to explore few alternatives which will not ask about certificates for encryption and signature verification.
- Format: PDF
- Size: 456.34 KB