Attack-Resistant Trust Metrics for Public Key Certification
نویسندگان
چکیده
This paper investigates the role of trust metrics in attack-resistant public key certification. We present an analytical framework for understanding the effectiveness of trust metrics in resisting attacks, including a characterization of the space of possible attacks. Within this framework, we establish the theoretical best case for a trust metric. Finally, we present a practical trust metric based on network flow that meets this theoretical bound.
منابع مشابه
Attack-Resistance of Computational Trust Models
The World Wide Web encourages widely-distributed, open, decentralised systems that span multiple administrative domains. Recent research has turned to trust management [4] as a framework for decentralising security decisions in such systems. However, whilst traditional security measures such as cryptography and encryption are well-understood (theoretically and empirically), the same cannot be s...
متن کاملThe Internet public key infrastructure
Long before the advent of electronic systems, different methods of information scrambling were used. Early attempts at data security in electronic computers employed some of the same transformations. Modern secret key cryptography brought much greater security, but eventually proved vulnerable to brute-force attacks. Public key cryptography has now emerged as the core technology for modern comp...
متن کاملReputation Systems for Trust Management in the Web PKI
This thesis’ goal is to reduce the attack surface of the existing Web Public Key Infrastructure (PKI) by applying user trust as in real world scenarios of human trust establishment. Reputation systems can be used to exchange Certification Authority (CA) trust information and lower the risk on relying on malicious CAs. The matter in question is connection trust, determining whether a SSL/TLS con...
متن کاملSearch for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements
The security of the Public Key Infrastructure has been reevaluated in response to Certification Authority (CA) compromise which resulted in the circulation of fraudulent certificates. These rogue certificates can and have been used to execute Man-in-the-Middle attacks and gain access to users’ sensitive information. In wake of these events, there has been a call for change to the extent of eith...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998