PKI – The Key To Security

Published: 23 March 2001 y., Friday
The success of future services will rely on building customer confidence. Many leading companies with an interest in the field have formed an alliance called Radicchio. The aim is to produce a standard for cross-platform, end-to-end encryption (the translation of data into a code that requires a secret key or password) for security. Known as PKI (Public Key Infrastructure), it comprises a two-part data encryption/ decryption key. One part is available for distribution to companies supplying services, while the other is kept privately by the user, much like the PIN number for a credit card. Mike Walker, chief scientist for Vodafone, chairman of the 3GPP (Third Generation Partnership Project – the standardisation forum for 3G mobile systems) Working Group SA3 (Security) and a member of the Radicchio board says that PKI is vital to ensure that mobile e-commerce does not suffer from the same degree of distrust as has fixed-access Internet trading. Other solutions do exist for these technologies. WAP has a built-in security feature, but it only encrypts data between the handset and the gateway to the Internet. This means that any data sent beyond this point could be read by anyone with the means to intercept it. Some companies, in partnership with banks and traders, have set up Virtual Private Networks (VPNs), so that customers can carry out secure transactions and pass sensitive data without using the public part of the World Wide Web. However, the service is only available from those companies that have signed up with a VPN. This may be fine for banks and their customers, but in the long run it will not deliver the freedom to trade with whomever one wishes on the public Web.
Šaltinis: cebitnews.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

search.lt news

search.lt presents newest links more »

Intel may use SOI in the future

Not ruled out, not ruled in more »

ICANN finally working on 'substantive issues'

The Internet Corporation for Assigned Names and Numbers (ICANN), meeting in Carthage, Tunisia this week, will be getting down to brass tacks on how the Internet works for the first time more »

search.lt news

search.lt presents newest links more »

Romania fighting ring of Internet vampires

Romania emerges as new world nexus of cybercrime more »

Alaska adopts crime data mining

A consortium of Alaskan law enforcement agencies today announced a new information sharing initiative that uses the commercially-available Coplink system to analyze disparate pieces of data for investigative leads more »

Students Fight E-Vote Firm

A group of students at Swarthmore College in Pennsylvania has launched an "electronic civil disobedience" campaign more »

Ballmer Touches All Bases

Microsoft Corp. has a variety of "opportunities" to take cost out of the development, deployment and day-to-day operations of IT systems more »

Spies Attack White House Secrecy

There's a "total meltdown" in America's intelligence services more »

Microsoft Drives Toward One Code Base

Project Green aims to bring enterprise applications, including Great Plains and Navision, into a single unified .Net architecture more »