Public key infrastructure utilization to provide an added level of authenticity to transmitted data
Blackmon, Jason B.
MetadataShow full item record
Information Systems have a need for a level of security to protect the data when being transmitted from one user to another. This thesis points out a method of protecting data utilizing an end-to-end level of security. The idea is grounded in looking at the advantages provided with the Public Key Infrastructure applied to add a level of authenticity to the data on the receiving end of a transmission. The focus of this thesis is protecting data transmitted across the Internet via e-mail using end-to-end security. This thesis proves that applying PKI as data protection to the Information System Application Layer can be used to provide secure end-to-end connections and e-mail is the tool chosen for this thesis to accomplish this goal. The scope of this thesis is to identify authentic and/or confidential communication of data across an Internetwork. The variables to discuss are the ability to digitally sign and secure the data with the digital signature, establishing a connection to an unregulated network, and confirmation of delivery of the data by an alternate user computer. This thesis will focus on using a public key signature point out how this provides authenticity, with a bonus inclusion of the integrity.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Schoberg, Paul R. (Monterey, California. Naval Postgraduate School, 2003-09);Aircraft accident investigation centers upon the analysis of all available information about the accident flight in the period leading up to the final catastrophe. Key among the sources of information is data captured and ...
Dobson, Lucas E. (Monterey, California. Naval Postgraduate School, 2010-06);The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the ...
Kiefer, Claudia J. (Monterey, California. Naval Postgraduate School, 1989-12);The rapid proliferation of communications and computer networks has spawned an urgent need for comparable developments in network security. Significant issues such as message authenticity, transmissions confidentiality ...