Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Certification authorities under attack: a plea for certificate legitimation
Oppliger R. IEEE Internet Computing18 (1):40-47,2014.Type:Article
Date Reviewed: May 5 2015

The legitimacy of certification in public-key infrastructure (PKI) is crucial for Internet security. This article discusses recent attacks against certification authorities (CA), revealing two main issues: certificate revocation and certificate authorization. Fundamentally, both issues are rooted in the lack of clear definition on who is authorized to issue or revoke certificates or claim them as valid for any given entity.

The authors examine the strengths and weaknesses of a set of countermeasures proposed in the literature, including (1) PK pinning, which patches a browser with a set of Google-authorized public keys and is not considered as a full-fledged solution; (2) DNS-based authentication of named entities (DANE)/sovereign keys, which depend on domain name system (DNS) security to provide certificate authentication (but DANE itself can easily become an attack target); and 3) perspectives/convergence, which uses a new trust model based on notary servers. However, it fails to defeat attacks against many notaries on a global scale.

None of these approaches solves all security problems. Yet, they are not mutually exclusive, indicating new research directions to combine their advantages.

Reviewer:  Ting Wang Review #: CR143414 (1508-0712)
Bookmark and Share
 
Public Key Cryptosystems (E.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy