07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Digital Signature Infrastructure<br />

A Digital Signature Infrastructure, or PKI (Public Key Infrastructure) is a “combination of technology<br />

(hardware and software), processes (policies, practices and procedures) and legal components<br />

(agreements) that associate the identity of the holder of a private key with its corresponding<br />

public key, using asymmetric cryptography technology” The use of a PKI in digital environments<br />

can be varied: to protect confidentiality (through the encryption of communications or stored<br />

data), to authenticate the identity of an individual or an organization, to report on the integrity<br />

of an electronic message or document, and to guarantee the non repudiation of electronic<br />

messages or transactions . (BUGONI, RIVOLTA; 2007), (RIVOLTA; 2008), (RIVOLTA; 2010)<br />

Components of the Digital signature Infrastructure<br />

Public key Technologies cannot guarantee by themselves the identification of individuals in the<br />

real world, either the identification of physical individuals, public and private organizations or<br />

attributes of entities of any type, such as servers.<br />

For this purpose, other additional actions have to be adopted, besides the public key technology.<br />

When speaking of Public Key Infrastructures (synonym of Digital Signature Infrastructure),<br />

reference is made to this set of elements that comprise the pairs of keys associated to an<br />

identification in the real world. It also comprises the mechanisms to generate the pairs of keys,<br />

the security measures to store the private key, and in this sense it is worth mentioning the<br />

devices for generating and storing the private key, as well as the mechanisms to secure the<br />

private key, that can be from a simple password, a passphrase, or based on biometrics (for<br />

example, fingerprints). (BUGONI, RIVOLTA; 2007), (RIVOLTA; 2008), (RIVOLTA; 2010).<br />

A distinctive characteristic of a PKI is that the receiver of the message has to have access to the<br />

public key of the individual who sends it. Thus it is how the digital certificate concept appears,<br />

as well as the need to have directories where such digital certificates are published, and that<br />

have to be accessible for public consultation.<br />

In order to satisfy the requirements stated in the above paragraph, a PKI involves the following<br />

elements:<br />

- Standards and protocols;<br />

- Software to implement a large number of functions and protocols;<br />

- Private keys protection;<br />

- A public keys repository, its creation, maintenance and use;<br />

- The elements to allow certification entities to digitally sign certificates;<br />

- A legal framework to regulate and support the infrastructure and its operation and<br />

- Services to support the operation of applications that use digital signature.<br />

Summarizing, a public key infrastructure includes:<br />

- A Certification Authority (CA – English acronym), also known as Certification Organization or<br />

484

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!