Improving Message Security With a Self-Assembling PKI _

نویسنده

  • Jon Callas
چکیده

Public key infrastructures (PKIs) exist for a number of purposes. One purpose is achieving widespread deployment of secure communication; the PKI makes it easy for two parties to communicate securely. Another purpose is that of secure delivery to a recipient; the PKI makes sure that when Alice sends a message to Bob, it arrives to the very Bob for whom Alice intended it. This white paper describes a Self-Assembling-PKI, a new way of constructing the corpus of certificates that makes up a PKI with an approach to the first goal – widespread deployment of secure communication. It does not address the second goal, but can use and interoperate with a PKI designed to achieve it. It creates itself by observing and monitoring existing message traffic and transparently inserting security protocols into existing traffic. Most radically, its mechanisms trade perfect security for ubiquity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Universally Composable Authentication and Key-Exchange with Global PKI

Message authentication and key exchange are two of the most basic tasks of cryptography. Solutions based on public-key infrastructure (PKI) are prevalent. Still, the state of the art in composable security analysis of PKI-based authentication and key exchange is somewhat unsatisfactory. Specifically, existing treatments either (a) make the unrealistic assumption that the PKI is accessible only ...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

A New PKI-based Single Sign-On Protocol for a Diminutive Security Device, PANDA, in a Ubiquitous Security Environment

This paper describes the issues and challenges in the design of a new PKI-based security infrastructure enhanced with single sign-on and delegation technology for a diminutive security device in a ubiquitous security environment. In order to provide the PKI-based ubiquitous security infrastructure in consideration of the issues, we propose a PKI-based single signon protocol that provides a user...

متن کامل

Extra ! Extra ! Irvine Is Burning with Exciting Network

Most secure routing proposals require the existence of a global public-key infrastructure (PKI) to bind a public/private key-pair to a prefix, in order to authenticate route originations of that prefix. A major difficulty in secure routing deployment is the mutual dependency between the routing protocol and the establishment of a globally trusted PKI for prefixes and ASes: cryptographic mechani...

متن کامل

Analysis of Vehicle-Based Security Operations

Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Ded...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003