Home / Expert Answers / Computer Science / advanced-topics-in-online-privacy-and-cybersecurity-introduction-implement-a-pki-programming-fun-pa307

(Solved): Advanced Topics in Online Privacy and Cybersecurity. Introduction implement a PKI. Programming (fun ...



Advanced Topics in Online Privacy and Cybersecurity. Introduction implement a PKI. Programming (functionality) implement a CA, Entity, and Relying Party. Roles in PKI: CAs - issue certificates to other entities. When issuing a certificate, a CA has no need to verify the identity of the entity being certified. A CA can also issue a certificate to an entity making them a CA themselves. Entities - Sign objects using their secret keys. Relying parties - given an object and cert chain, know to check object is valid. Implement a CA, an Entity with a certificate from a CA and a Relying Party that knows to verify objects signed by your entity. Objects should be serializable for signing purposes (an entity signs the serialization of the object). Make sure that the certs issued by your CA include validity dates. Additionally design and implement a revocation mechanism for certificates. Programming (security) A CA never sees an entity's secret key. A certificate includes validity dates. You may use this library for encryption and verification.



We have an Answer from Expert

View Expert Answer

Expert Answer


We have an Answer from Expert

Buy This Answer $5

Place Order

We Provide Services Across The Globe