Certificate Revocation Paradigms

نویسنده

  • Jan Willemson
چکیده

With the extensive development of applications of public key cryptography, the need for supporting infrastructure arose. It became clear that a person can not just use another person’s public key obtained in some way, but he also has to be sure that the key and its claimed owner really belong together and that the connection is not expired. One of the oldest and most widespread ideologies to satisfy the demands above is the PKIX one (Public Key Infrastructure using X.509, we refer intersested reader to [1]). The idea is to introduce a Trusted Third Party (TTP) also known as Certification Authority (CA) whose public key is trusted and who signs the certificate “the person A and the key N belong together at time t, this connection being valid for the time δt” by his secret key. One major trouble that can occur is the problem of compromise (or otherwise losing its validity) of A’s public key before the time t+ δt. Although the verifier B could have a trusted certificate and check that the public key has not yet expired, he still should not trust A’s public key. To be absolutely sure, he has to check that the certificate has not been revoked. It is clear that along with the information about the issuded certificates, the CA must also distribute the information concerning the revoked ones among them. The whole problem is finding a suitable infrastructure for that purpose in order to make the distribution of the revocation information operative and the structure itself scalable. In what follows we will consider several systems proposed and discuss their properties.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Model to Evaluate Certificate Revocation

This paper presents a model to evaluate certificate revocation using certificate revocation lists (CRL's) of the X.509 standard. The model shows the relationship between the number of users managed by a Certificate Authorities (CA) and the size of the revocation lists, the computation power of the CA and the necessary bandwidth to access the revoked certificates.

متن کامل

Study and Analysis on Certificate Revocation in MANETS

In Mobile Ad hoc Networks (MANETs), certification systems play an important role to achieve network security. Handling the issue of certificate revocation in wired network is somewhat easy compared to the MANETs. In wired network when the certificate of a malicious node get revoked then the certificate authorities add the information about the revoked node in to certificate revocation lists (CR...

متن کامل

Empirical Analysis of Certificate Revocation Lists

Managing public key certificates revocation has long been a central issue in public key infrastructures. Though various certificate revocation mechanisms have been proposed to address this issue, little effort has been devoted to the empirical analysis of real-world certificate revocation data. In this paper, we conduct such an empirical analysis based on a large amount of data collected from V...

متن کامل

Certificate Revocation Lists or Online Mechanisms1

With more and more acceptance of Digital Certificates and Public Key Infrastructures (PKI), the mechanisms to revoke a certificate in a PKI have recently received increasing attention. The revocation mechanisms are commonly classified into Certificate Revocation Lists (CRLs), trusted dictionaries and online mechanisms. The designer of a PKI should select an appropriate revocation method suiting...

متن کامل

Using CRL Push Delivery for Efficient Certificate Revocation Information Distribution in Grids

Checking revocation information is necessary to prevent from using digital certificates whose contents become invalid. In current system either periodical retrieval of Certificate Revocation Lists (CRLs) or the Online Certificate Status Protocol (OCSP) are the most common mechanisms to access revocation information issued by the certification authorities. As both these approaches pose problems ...

متن کامل

Windowed Key Revocation in Public Key Infrastructures

A fundamental problem inhibiting the wide acceptance of a Public Key Infrastructure (PKI) in the Internet is the lack of a mechanism that provides scalable certificate revocation. In this paper, we propose a novel mechanism called Windowed Revocation. In windowed revocation, certificate revocation is announced for short periods in periodic Certificate Revocation Lists (CRLs). Due to the assuran...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره cs.CR/9909012  شماره 

صفحات  -

تاریخ انتشار 1999