You are on page 1of 2
Public keys can be cancelled by a user in case of a suspected theft of the key of the uses docs not want the same key to be used for longer period. Revoking ofpublic key a: a procedure carried out by the owner in Which a leey revocation, certificate is signed by the owner with his private key A. evocation certifrcate looks like a signature certificate, but it be revoked. After sasuins the certificate. the user broadcasts: the certificate as widely and as quickly as possible so that other ters can quickly remove the revoked public ley from ‘hor public key Sines S/MIME Key Management ‘The following are the functions performed by a user as a part of key management in S/MINIE description of a function. These, rerms are used to specify the degree of requirement Must ‘This term is used when there is no such absolute requirement of the feanire. Bur itis recommended or it would be better if the Feature is included in the implementation, 1. Key Generation A user who is responsible for LAN management “Must” be capable of sencmting different DSS and Diffie Helman key pairs. He “Should” also be capable of creating RSA key pairs, Every key pair generated “Must’ be from a random input source which cannot be determined and should be securely protected. The lengths of RSA key pairs can vary benween 768 to 1024 bits and “Must Not’ be lesser than 512 bits 2. Registration To receive an X 509 public key certificate the user must register his public key with a Certification Authority. Strater. These certificates are used by users te check the intenrity OF incomun= aimaatwres snd encrypt messages (©) Discuss the significance of key Idenutiers, ina PGP mn Answer -13/Jan.-14, Set-3, A5() Key IDs plays ani nt role in the operation of PGP aged 4 matic way and are uscd by all the users efficiently. It is known that a user can have more than one public! private key pain Hence an ID oF some Kind is needed by cach, User Each public key accompanied by key 1D consists of its least {Od bits (Le. key ID OF public key CU, is KU, Od 264) nt length because the probability of having IDs of PGP digital signature also uses 5 one among the Aumber of Key ID because a sender may util Private keys for the message digest encryption and {should Be @5. Discuss in brief about federated identity management and SaaS identity management. Answer: Federated Identity Managemen Federated identity management is a management system which make use of several standards-based strategies tomanage across the distributed organization and application platforms @) Authentication &) Single. sign-on (©) Role-based access contret G@) Session management Interoperability among number of parties is established through federation which is enabled by using open industry standards and/or openly published specifications. This management system enables the user to conduct the transaction by utilizing the same username. password so a= to access the network having multiple entities Single sign-on property enable the user to access more than one application with a single login operation rather than multiple login operations For this purpose federated identity management make use of protocol standards such as” Liberty Alliance Identity Federation Framework (ID-FF) .~ OASIS Security Assertion Markup Language (SAML)" and ~ WS- Federation” These protocol standards translate different credentials required in different authentication mechanisms to the one used during initial authentication

You might also like