Abstract
Public-key infrastructures are increasingly being used as foundation for several security solutions, such as electronic documents, secure e-mail (S/MIME), secure web transactions (SSL), and many others.
However, there are still many aspects that need careful consideration before these systems can really be used on a very large scale. In this respect, one of the biggest issues to solve is certificate validation in a generic multi-issuer certification environment.
This paper begins by introducing the problem, also with the help of a famous security incident related to certificate validation, and then proceeds to review the user and system requirements. We take into account several constraints, such as computational power of the end-user client (workstation, PDA, cellular phone), network connectivity (permanent or intermittent, high or low speed) and security policy to be respected (personal or company-wide trust). We then proceed to define a general certificate validation architecture and show how several proposed certificate management formats and protocols can be used within this general architecture and which are the relative merits and drawbacks. Finally, the support offered by commercial products to certificate validation is analyzed, and the path towards better solutions for an effective deployment of certificates is sketched.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. K. Reiter, S. G. Stubblebine, Towards Acceptable Metrics of Authentication, Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 10–20.
R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, IETF, 1999
Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard, Microsoft Security Bulletin MS01-017, available at http://www.microsoft.com/TechNet/security/bulletin/MS01-017.asp
T. Bray, J. Paoli, C.M. Sperberg-McQueen, Extensible Markup Language (XML) 1.0, W3C Recommendation, 10-February-1998, available at http://www.w3.org/TR/1998/REC-xml-19980210
B. Ramsdell, S/MIME Version 3 Message Specification, RFC 2633, IETF, 1999
T. Dierks, C. Allen, The TLS Protocol Version 1.0, RFC 2246, IETF, 1999
T. Beth, M. Borcherding, B. Klein, Valuation of trust in open networks, European Symposium on Research in Computer Security, ESORICS 1994, vol. 875 of Lecture Notes in Computer Science, Springer-Verlag, 1994, pp. 3–18
U. Maurer, Modelling a public-key infrastructure, European Symposium on Research in Computer Security, ESORICS 1996, vol. 1146 of Lecture Notes in Computer Science, Springer-Verlag, 1996, pp. 325–350
M. K. Reiter, S. G. Stubblebine, Path independence for authentication in largescale systems, Proceedings of ACM Conference on Computer and Communications Security, Zurich, Switzerland, April, 1997, pp. 57–66
W. Ford, M. S. Baum, Secure Electronic Commerce, Prentice Hall, 1997
P. McDaniel, S. Jamin, Windowed Key Revocation in Public Key Infrastructures, Tech. Rep. CSE-TR-376-98, EECS(Univ. of Michigan), 1998
ITU-T Recommendation X.509-ISO/IEC 9594-8, 1995
M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP, RFC 2560, IETF, 1999
M. Naor, K. Nissim, Certificate Revocation and Certificate Update, IEEE Journal on selected areas in communications, Vol. 18, No. 4, 2000, pp. 561–570
H. Kikuchi, K. Abe, S. Nakanishi, Performance evaluation of public-key certificate revocation system with balanced hash tree, Proceedings of International Workshops on Parallel Processing, Wakamatsu, Japan, 1999, pp. 204–209
M. Myers, S. Farrell, C. Adams, Delegated Path Discovery with OCSP, draft-ietfpkix-ocsp-path-00.txt, IETF Internet Draft, September 2000
M. Myers, C. Adams, S. Farrell, Delegated Path Validation, draft-ietf-pkix-ocspvalid-00.txt, IETF Internet Draft, August 2000
M. Myers, R. Ankney, C. Adams, S. Farrell, C. Covey, Online Certificate Status Protocol, version 2, draft-ietf-pkix-ocspv2–02.txt, IETF Internet Draft, March 2001
A. Malpani, P. Hoffman, R. Housley, Simple Certificate Validation Protocol (SCVP), draft-ietf-pkix-scvp-05.txt, IETF Internet Draft, June 2001
D. Pinkas, Delegated Path Validation and Delegated Path Discovery Protocols, draft-ietf-pkix-dpv-dpd-00.txt, IETF Internet Draft, July 2001
http://www.VeriSign.com/onsite/datasheets/validation/validation.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Berbecaru, D., Lioy, A., Marian, M. (2001). On the Complexity of Public-Key Certificate Validation. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_13
Download citation
DOI: https://doi.org/10.1007/3-540-45439-X_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42662-2
Online ISBN: 978-3-540-45439-7
eBook Packages: Springer Book Archive