Real-World Problems of PKI Hierarchy
نویسنده
چکیده
Public key cryptography has become very popular recently. To use it securely, it is necessary to employ systems offering at least a basic set of functions associated with public key cryptosystems containing generation of keys, secure generation of certificates, verification of signatures, dissemination of revoked certificates, and so on. This paper demonstrates that the use of public key cryptography is not easy and it is very difficult to perform the above-mentioned actions in a way satisfying some predefined security level. The reason is in the complexity of the problem. We are not generally able to ensure the usage of systems able to work with all existing algorithms, key lengths, and formats in the whole public key infrastructure. Also, some people are of the opinion that X.509 as a basis for PKI is obsolete.
منابع مشابه
Greenpass: Decentralized, PKI-based Authorization for Wireless LANs∗
In Dartmouth’s ”Greenpass” project, we’re building an experimental system to explore two levels of authorization issues in the emerging information infrastructure. On a practical level, we want to enable only authorized users to access an internal wireless network—while also permitting appropriate users to delegate internal access to external guests, and doing this all with standard client soft...
متن کاملPKI Technology Survey and Blueprint
This paper presents and examines the results of a series of interviews in which a cross-section of experienced programmers, system administrators, and technical project managers with many years of practical, real-world experience were asked which technologies they would use to solve some of the major problems which occur in PKI implementation. The results of the interviews and various significa...
متن کاملFinding the PKI needles in the Internet haystack
Public key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a Public Key Infrastructure (PKI). PKIs have become a central asset for many organizations, due to distributed IT and users. Even though the usage of PKIs in closed and controlled environments is quite common, interoperability a...
متن کاملExperience with Pki in a Large-scale Distributed Environment
PKI shows some weaknesses when used in real deployment, such as problems with securing the private key, combination of PKI with other authentication systems, availability of revocation information, user-friendliness of PKI system and relationship with federation systems. In this paper we present solutions that were used during PKI deployment in a grid distributed environment.
متن کاملA New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model
Despite the fact that the traditional public key infrastructure provides Level 3 trusted authority, but its two major problems of scalability and certificate management raised the need to an alternative security infrastructure. That motivated the appearance of new technologies to replace the traditional PKI, such as the Identity based encryption, the certificateless encryption, etc. But all tho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001