Department of Computer Science & Engineering

M.Tech. I (CO) Semester - 2

L

T

P

C

CO606: PKI AND TRUST MANAGEMENT   

3

0

2

4

COURSE OBJECTIVES
  • Introduce students to concepts of public key infrastructures.
  • Introduce students to need of Identity Management Process and its importance in public key infrastructure.
  • Introduce students to basics of Trust Management.
  • COURSE OUTCOMES
    After successful completion of this course, student will be able to
    • Distinguish between public key technology and a public key infrastructure.
    • Explain the need for a rigorous identity management process and its role in a public key infrastructure.
    • Differentiate the necessary components of a certificate policy and practices statement.
    • Understand implementation of a public key infrastructure, including the technology, policy, standards, and long-term maintenance considerations.
    COURSE CONTENT
    INTRODUCTION AND INFRASTRUCTURE CONCEPTS

    (02 Hours)

    Pervasive security services, Building a comprehensive security model

    PKI SYSTEM ESSENTIALS

    (10 Hours)

    Public key cryptosystems, Authentication protocols, Key management techniques

    PKI FUNCTIONS

    (10 Hours)

    ENCRYPTION, DECRYPTION, SIGNATURE, VERIFICATION Certification Authority, Certificate repository, Key recovery, Server & User Certificates, PKI & IPSec, PKI Technologies, PKI Solutions Interoperability

    ENTERPRISE WIDE PKI

    (08 Hours)

    Internal PKI Architectures, Key Deployment & Management, Certification Process, Keys & Policies, Password Validation Procedures, Managing Keys, Key Distribution, Key Backup & Recovery, PKCS standards

    PKI TRUST CONCEPTS

    (08 Hours)

    Generating, using and validating digital signatures, Building a Certification Authority and extending trust through PKI, Integrating a PKI with existing directory systems, Linking PKIs using cross-certification, Identifying certificate components, P2P trust, Web of Trust

    INTEGRATING A PKI WITH APPLICATIONS

    (04 Hours)

    Implementing a PKI solution to support a selected environment, Advanced topics

    (Total Contact Time: 42 Hours)

    PRACTICALS
    1. Enhanced Web Security and Digital Certificates
    2. Encryption/Decryption in e-mail
    3. Signing and Verification in e-mail
    4. Password strength and attacks
    5. RSA cryptosystem
    6. DH key exchange
    7. Kerberos
    BOOKS RECOMMENDED
    1. Bruce Scheneir: "Applied Cryptography", 2/E, John Wiley, 1996.
    2. Menezes, Oorschot, Vanstone: "Handbook of Applied Cryptography", CRC Press, 1996.
    3. Philip. Robinson, Harald. Vogt, Waleed. Wagealla ,"Privacy, Security, and Trust Within the Context of Pervasive Computing", 1/E, Springer, 2004.
    4. David Chadwick, Gansen Zhao, "Public Key Infrastructure: Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, 2005, Revised Selected Papers (Lecture Notes in Computer Science) ", 1/E, Springer; 2005.
    5. Ketil Stølen , William H. Winsborough ,Fabio Massacci, "Trust Management: 4th International Conference, iTrust 2006, Proceedings (Lecture Notes in Computer Science) ", 1/E, Springer, 2006.