07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

specific and with a clearer semantic content. (BUGONI, RIVOLTA; 2007), (RIVOLTA; 2008),<br />

(RIVOLTA; 2010)<br />

Standards are referred to the following components, among many other:<br />

• Standards for encryption algorithms and hash algorithms.<br />

• Protocols for parameters associated to the encryption algorithms and hash algorithms.<br />

• Protocols to facilitate the access of users to public keys.<br />

• Protocols to facilitate the access of users to revocation reports<br />

• Standards for secure generation of pairs of keys<br />

• Standards and protocols to support synchronization and time stamping mechanism with<br />

probative value<br />

• Standards for the following software and applications:<br />

- Generation of pairs of keys<br />

- Storage of private keys<br />

- Storage of public keys<br />

- Users’ access to public keys<br />

- Generation of secure message digest<br />

- Message encryption<br />

- Message creation<br />

- Request of public keys<br />

- Verification of public keys: their validity, their expiring term, if not having been revoked<br />

- Message decryption<br />

- Secure digest decryption<br />

- Comparison of decrypted digests<br />

- Time<br />

- Private keys protection<br />

- Against intrusions when they are stored<br />

- Against intrusions when they are in the main memory<br />

- Against non-authorized invocations<br />

• Of Directory if it is used as a public keys Repository:<br />

- Protocols to insert data and keep data in the repository<br />

- Protocols to access to repository data<br />

• Of the Certification Authority certificates:<br />

- Standards for certificate formats<br />

- Profiles for the application of Standards in particular contexts<br />

• Protocols for the communication of certificates to the parties that may need them<br />

• Means through which message receivers are able to evaluate whether they check the<br />

certificate digital signature<br />

• Means through which message receivers can check the certificate digital signature<br />

• Means through which message receivers can evaluate the extension of the statements<br />

contained in the certificate<br />

• If certificates are signed by Certification Authorities<br />

486

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!