PKI – The Key To Security

Published: 23 March 2001 y., Friday
The success of future services will rely on building customer confidence. Many leading companies with an interest in the field have formed an alliance called Radicchio. The aim is to produce a standard for cross-platform, end-to-end encryption (the translation of data into a code that requires a secret key or password) for security. Known as PKI (Public Key Infrastructure), it comprises a two-part data encryption/ decryption key. One part is available for distribution to companies supplying services, while the other is kept privately by the user, much like the PIN number for a credit card. Mike Walker, chief scientist for Vodafone, chairman of the 3GPP (Third Generation Partnership Project – the standardisation forum for 3G mobile systems) Working Group SA3 (Security) and a member of the Radicchio board says that PKI is vital to ensure that mobile e-commerce does not suffer from the same degree of distrust as has fixed-access Internet trading. Other solutions do exist for these technologies. WAP has a built-in security feature, but it only encrypts data between the handset and the gateway to the Internet. This means that any data sent beyond this point could be read by anyone with the means to intercept it. Some companies, in partnership with banks and traders, have set up Virtual Private Networks (VPNs), so that customers can carry out secure transactions and pass sensitive data without using the public part of the World Wide Web. However, the service is only available from those companies that have signed up with a VPN. This may be fine for banks and their customers, but in the long run it will not deliver the freedom to trade with whomever one wishes on the public Web.
Šaltinis: cebitnews.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

Symantec Offers SMBs a Better Sense of Security

Firewalls, VPNs, intrusion detection are becoming as common in the business vernacular as balance sheets, P & L statements and chart of accounts more »

IBM To Bulk Up On-Demand Centers

IBM is set to make a major push in its drive to become the top provider of utility, or "on-demand," computing services more »

search.lt news

search.lt presents newest links more »

CeBIT'2004: Talking technology

Talkative future for every gadget more »

The accusation

Internet suppliers have to connect abroad in order to connect with Poland more »

Panasonic preps 1GB Secure Digital card

Panasonic announced on Friday that it plans to launch a 1GB Secure Digital card first in Japan in April more »

Who should govern the Net?

It's no longer merely an academic question more »

NEC shrinks music, grows phones

NEC has launched the e616, its latest feature-packed 3G handset at CeBIT more »

Sony doubles up with AIT-4

Sony has launched the fourth generation of its AIT (Advanced Intelligent Tape) format at CeBIT more »

ICANN surveys proposed Net domains

The Internet's real estate may soon be expanding, with the proposed addition of up to nine new top-level domains, including .jobs, .xxx, .travel and .mail more »