Assessing PKI

ثبت نشده
چکیده

34 Published by the ieee ComPuter soCiety ■ 1540-7993/09/$25.00 © 2009 ieee ■ ieee seCurity & PrivaCy A public-key infrastructure is a collection of hardware, software, processes, and people that together provide security services based on public-key cryptography. Many countries, including Norway, Sweden, Denmark, Finland, Estonia, Austria, Belgium, and Canada, have introduced large-scale security frameworks implementing PKIs. In particular, nationwide PKIs can provide strong authentication services, reducing the risk of security breaches compared to frameworks that use, for example, fixed or one-time passwords. However, it’s both difficult and costly to design and implement a large PKI correctly, so there’s a real danger of ending up with a flawed solution. The Norwegian banking industry’s PKI, BankID, primarily authenticates Internet banking customers. Currently, the country’s banking industry is pushing for BankID to become a national ID infrastructure that government agencies and commercial companies would use to authenticate individuals and provide legally binding digital signatures with a high degree of non-repudiation. In previous articles, we analyzed Norwegian Internet banking and automatic teller machine systems. Here, we take on BankID and examine how it differs from a typical PKI based on the X.509 ITU-T standard. We then offer a qualitative risk assessment of its user authentication and discuss the non-repudiation service. Because the Norwegian banking community declined to share technical information about BankID, we could evaluate it only from the outside and were unable to assess important aspects of the system, such as contingency planning and disaster recovery. Our evaluation, which we completed in January 2008, is based on publicly available descriptions of the BankID architecture and design, as well as our personal use of the system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

رمزنگاری مبتنی بر شناسه در شبکه‌های حسگر‎ ‎بی‌سیم

در سال­های اخیر برای حل مشکل توزیع کلید و تعداد زیاد کلیدهای ذخیره شده در شبکه‌های حسگر بی‌سیم از رمزنگاری کلید عمومی استفاده شد. در این شبکه‌ها از ین نوع رمزنگاری برای انجام احراز اصالت و توافق کلید بهره گرفته شده است. پر کاربردترین رمزنگاری کلید عمومی که  مبتنی بر گواهی است از زیر ساخت ‏کلید عمومی (PKI) استفاده می‌کند. همان طور که می‌دانیم برای پیاده‌‌سازی PKI نیازمند میزان قابل توجهی حافظه، ...

متن کامل

Web PKI: Closing the Gap between Guidelines and Practices

A string of recent attacks against the global public key infrastructure (PKI) has brought to light weaknesses in the certification authority (CA) system. In response, the CA/Browser Forum, a consortium of certification authorities and browser vendors, published in 2011 a set of requirements applicable to all certificates intended for use on the Web and issued after July 1st, 2012, following the...

متن کامل

Vascular endothelial cells express isoforms of protein kinase A inhibitor.

The expression and function of the endogenous inhibitor of cAMP-dependent protein kinase (PKI) in endothelial cells are unknown. In this study, overexpression of rabbit muscle PKI gene into endothelial cells inhibited the cAMP-mediated increase and exacerbated thrombin-induced decrease in endothelial barrier function. We investigated PKI expression in human pulmonary artery (HPAECs), foreskin m...

متن کامل

A QSAR Study of HIV Protease Inhibitors Using Computational Descriptors to Prediction of pki of Cycle Derivatives of Urea

Preventing and reducing the spread of HIV (HIV) has always been a concern in medical science. One of the most common ways to control the virus is using enzyme-blocking drugs. In this study, we attempted to predict the biological activity (PKi) of organic urea derivatives in protease inhibitor compounds using molecular modeling using QSAR (Quantitative Structure Activity Relation), which is the ...

متن کامل

Privacy-awareness in Blockchain-based PKI

Conventional public key infrastructure (PKI) designs are not optimal and contain security flaws; there is much work underway in improving PKI. The properties given by the Bitcoin blockchain and its derivatives are a natural solution to some of the problems with PKI in particular, certificate transparency and elimination of single points of failure. Recently-proposed blockchain PKI designs are b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009