Security issues in PKI and certification authority design

被引:0
|
作者
Kent, S [1 ]
机构
[1] BBN Technol, Cambridge, MA USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Much of the literature related to public key infrastructure (PKI) uses terms such as "trust" extensively and assumes that certification authorities (CAs) are trusted third parties (TTPs). Also, in analyzing the security of CAs, most of the emphasis is on protecting CA private keys and on accurate authentication of the requester of a certificate. This paper adopts a different perspective on these topics. It argues that, in the best circumstances, CAs should not have to be trusted explicitly. Rather. "natural" CAs merit an implied trust due to their position as authoritative entities responsible for name spaces, authorization information, etc. This approach to PKI has numerous advantages relative to the TTP model. With regard to CA security, we argue that there is one, primary, CA security requirement, and all others derive from it. This perspective results in a slightly different view of what is critical to CA security. More importantly, it argues for a system approach to CA security, and suggests a way of focusing attention on a very small part of the CA system to achieve a very high level of security.
引用
收藏
页码:33 / 52
页数:20
相关论文
共 50 条
  • [1] Design and Implementation of PKI-based Certification Authority
    Zheng Ying
    Bai Qinghai
    Zhao Linna
    Chun Hua
    Chen Jing
    SIXTH INTERNATIONAL CONFERENCE ON ELECTRONICS AND INFORMATION ENGINEERING, 2015, 9794
  • [2] The US Federal PKI and the Federal Bridge Certification Authority
    Alterman, P
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2001, 37 (06): : 685 - 690
  • [3] Evaluating certification authority security
    Kent, S
    1998 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOL 4, 1998, : 319 - 327
  • [4] A new modified bridge certification authority PKI trust model
    Li, Mingchu
    Ren, Yizhi
    Wang, Zhihui
    Xie, Jun
    Yao, Hongyan
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 23 - +
  • [5] Security and certification issues in grid computing
    Foster, I
    Siebenlist, F
    Tuecke, S
    Welch, V
    CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 47 - 55
  • [6] Design of an outdoor position certification authority
    De Prisco, Roberto
    De Santis, Alfredo
    Faruolo, Pompeo
    Mannetta, Marco
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (04) : 404 - 413
  • [7] PKI design based on the use of on-line certification authorities
    Javier Lopez
    Antonio Maña
    Jose A. Montenegro
    Juan J. Ortega
    International Journal of Information Security, 2004, 2 (2) : 91 - 102
  • [8] Security model design for Lustre based on PKI
    Liu, Su-Qin
    Li, Xing-Sheng
    Shuo, Jun
    Wang, Jing
    Zhongguo Shiyou Daxue Xuebao (Ziran Kexue Ban)/Journal of China University of Petroleum (Edition of Natural Science), 2009, 33 (05): : 164 - 167
  • [9] PKI and digital certification infrastructure
    Hunt, R
    NINTH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, PROCEEDINGS, 2001, : 234 - 239
  • [10] Introducing decryption authority into PKI
    Bao, F
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 288 - 296