Wyniki wyszukiwania

Filtruj wyniki

  • Czasopisma
  • Data

Wyniki wyszukiwania

Wyników: 1
Wyników na stronie: 25 50 75
Sortuj wg:

Abstrakt

This research investigates the intricacies of X.509 certificates within a comprehensive corporate infrastructure. Spanning over two decades, the examined enterprise has heavily depended on its internal certificate authority and Public Key Infrastructure (PKI) to uphold its data and systems security. With the broad application of these certificates, from personal identification on smart cards to device and workstation authentication via Trusted Platform Modules (TPM), our study seeks to address a pertinent question on how prevalent are weak RSA keys within such a vast internal certificate repository. Previous research focused primarily on key sets publicly accessible from TLS and SSH servers or PGP key repositories. On the contrary, our investigation provides insights into the private domain of an enterprise, introducing new dimensions to this problem. Among our considerations are the trustworthiness of hardware and software solutions in generating keys and the consequential implications of identified vulnerabilities on organizational risk management. The obtained results can contribute to enhancing security strategies in enterprises.
Przejdź do artykułu

Autorzy i Afiliacje

Konrad Kamiński
1 2
ORCID: ORCID
Wojciech Mazurczyk
1
ORCID: ORCID

  1. Faculty of Electrical Engineering and Communication, Warsaw University of Technology, Warsaw, Poland
  2. SecurityTechnology Development and Transformation Division, Orange Polska S.A.,Warsaw, Poland

Ta strona wykorzystuje pliki 'cookies'. Więcej informacji