Review of Various Block-chain Based SSL Techniques

Submission Deadline-30th July 2024
June 2024 Issue : Publication Fee: 30$ USD Submit Now
Submission Deadline-20th July 2024
Special Issue of Education: Publication Fee: 30$ USD Submit Now

International Journal of Research and Scientific Innovation (IJRSI) | Volume VI, Issue V, May 2019 | ISSN 2321–2705

Review of Various Block-chain Based SSL Techniques

P. Rajitha Nair1, Dr. Ramya Dorai2, Vinod Unnikrishnan3

IJRISS Call for paper

1Computer Science Department, NHCE, Bengaluru, Karnataka, India
2Computer Science Department, TJIT, Bengaluru, Karnataka, India
3Virtusa, Bengaluru, Karnataka, India

Abstract – Operating under constant threat of attacks, users have long been accustomed to verify the SSL certificate, to ensure that the site is secure. SSL is used to transmit sensitive information over the Internet, and it has been a significant driver of e-commerce from long. This process involves protocols including the Secure Sockets Layer (SSL) and Transport Layer Security (TLS), as well as certificate authorities (CAs), entities that issue digital certificates to organizations or individuals. The research topic being pursued is an alternative approach to ensure trust can be established using certificates – via the Block-chain algorithm

Keywords – SSL, TLS, Block-chain, Proof Of Concept, Proof Of Work

I. INTRODUCTION

Public Key Infrastructure

Public Key Infrastructure (PKI) is a collection of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. PKI facilitates secure transfer of information for various network activities such as e-commerce, internet banking and confidential email. It is necessary where passwords are inadequate authentication method and rigorous proof is required to confirm the identity of the parties involved in the communication and to validate the information being transferred.
In cryptography, PKI is an arrangement that binds public keys with respective identities of entities (like people, companies, educational institutions). This binding is established via process of registration and issuance of certificates at and by a certificate authority (CA). This may be carried out by an automated process or under human supervision, depending on the assurance level of the binding,
The main actors in PKI are:

  • Registration Authority (RA) – RA’s function is accepting requests for digital certificates and authenticating the entity making the request
  • Certifying Authority (CA) –CA’s function is to ensure that an entity is uniquely identifiable within their domain on the basis of entity’s information
  • Validation Authority (VA) – VA’s function is to provide this entity’s information on behalf of the CA.