TITLE:
Public Key Infrastructure: A Survey
AUTHORS:
Aysha Albarqi, Ethar Alzaid, Fatimah Al Ghamdi, Somaya Asiri, Jayaprakash Kar
KEYWORDS:
Impersonating Attack, Ephemeral Key, Compromise Attack, Certificate Repository
JOURNAL NAME:
Journal of Information Security,
Vol.6 No.1,
January
8,
2015
ABSTRACT: As security is essential in communications through electronic networks, development of structures providing high levels of security is needed. Public Key Infrastructure (PKI) is a way of providing security measures by implementing the means of key pairs among users. In this paper, an overview of the public key infrastructure is discussed that includes various components and operation, some well known PKIs and their comparisons. Also we discuss current implementations, risk and challenges of PKIs.