BC4002 Public Key Infrastructure Syllabus:

BC4002 Public Key Infrastructure Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 Understand public key infrastructure technology
 Understand Public Key Algorithms
 Understand centralized and decentralized infrastructure
 Understand concept of digital certificates
 Learn various security threats to E-commerce

UNIT I OVERVIEW OF PKI TECHNOLOGY

Overview of PKI Technology: Symmetric Vs. Asymmetric Ciphers, PKI Services, PKI Enabled Services, Certificates and Certification, Digital Signatures, Securing Web Transactions, Key and Certificate Life Cycles, PKI Standards, Third Party CA Systems, Secure Socket Layer(SSL), CA System Attacks, Key Escrow Vs Key Recovery, Certification Practices, Securing Business Applications, PKI Readiness.

UNIT II PKI ALGORITHMS

Public Key Algorithms, Knapsack, RSA, Pohlig-Hellman, Rabin, Elgamal, McEliece, Elliptic Curve Cryptosystems, LUC, Finite Automation Public Key Cryptosystems, Public Key, Digital Signature Cryptosystems: GOST, ESIGN.

UNIT III DESIGN, IMPLEMENTATION, MANAGEMENT

Design, Implementation and Management of PKI: PKI Design Issues, PKI-ROI, Architecture for PKI (APKI), Implementing Secure Web services Requirements using PKI, Versign’s Foundation in Managed Security Services, Implementation and Deployment, Implementation Costs, PKI Performance, Obtaining a Certificate, Certification Revocation with Managed PKI, Open Revocation Solutions for Today’s Enterprise PKI needs.

UNIT IV E-COMMERCE SECURITY THREATS

Security Threats to E-commerce: Internet Security Issues Overview, Intellectual Property Threats, Threats to the Security-Client Computers, Communication Channels, Server Computers, Implementing Electronics Commerce Security: Objects, Protecting- Client Computers, Communication Channels, Web Server, Access Control: Authentication, Authorization and Accountability Controls.

UNIT V APPLICATIONS OF PKI

Applications of PKI: Trust Models, Deployment and Operation, X.509 Certificates, E-commerce: the building blocks – Trusted Business Environment for E-commerce, Certification, Certification Practice and Policy, Registration, Certification usage and revocation, PKI in Electronic Government; Trusted Services and PKI: Technology Commonality in Approaches and Government Initiatives.

COURSE OUTCOMES:

After the completion of this course, students will be able to
CO1: Understand the core fundamentals of public key infrastructures
CO2: Develop and use secure Public Key Algorithms
CO3: Design, Implement and Manage the public key infrastructures
CO4: Identify the security threats to E-commerce
CO5: Evaluate use of PKI for different applications

TOTAL: 45 PERIODS

REFERENCES

1. Larry Caffrey, Rogers W’O. Okot-Uma, “Trusted Services and Public Key Infrastructure PKI) International Council of Information Technology in Government Administration, 2000.
2. Cartisle Adams, Steve Lloyd, “Understanding PKI: Concepts, Standards and Deployment Considerations:, Pearson Education, 2003.
3. Vacca R Vacca, “Public Key Infrastructure: Building Trusted Applications and Web Services”, CRC Press LLC 2004.
4. Andrew Nash, William Daune, Celia Joseph and Derek Brink, “PKI – Implementing and Managing E-Security, Tata McGraw-Hill Edition, 2001.
5. GrayP. Schneider, “Electronic Commerce”, Fourth Annual Edition, 2003.
6. Roberta Bragg, Mark Phodes-Ousley and Keith Strassberg, “The Complete Reference Network Security”, Tata McGraw-Hill Edition, 2004.
7. Bruce Schneier, “Applied Cryptography”, John Willey and Sons, 2001.