The Fundamental Inadequacies of Conventional Public Key Infrastructure
نویسنده
چکیده
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature technology, based on public key cryptography, has been claimed as appropriate means to achieve this aim. Digital signatures do little, however, unless a substantial 'public key infrastructure' (PKI) is in place, such that parties know what is being authenticated, and what level of assurance is provided. Conventional PKI, built around the ISO standard X.509, has been, and will continue to be, a substantial failure. This paper examines conventional X.509v3-based PKI architecture, and identifies key deficiencies including its inherently hierarchical and authoritarian nature, its unreasonable presumptions about the security of private keys, a range of other technical and implementation defects, confusions about what it is that a certificate actually provides assurance about, and its inherent privacy-invasiveness. A model is presented that explains the naiveté of identity authentication, and how ecommerce needs to be baaed on ‘nyms‘ rather than ‘identifiers‘. Alternatives to conventional PKI are identified.
منابع مشابه
Identity-Based Key Management in MANETs using Public Key Cryptography
Wireless mobile Ad Hoc Networks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI) requires a central authority or trusted third p...
متن کاملIs Provision of Healthcare Sufficient to Ensure Better Access? An Exploration of the Scope for Public-Private Partnership in India
Background India’s economic growth rate in recent years has been fairly impressive. But, it has been consistently failing to make considerable progress in achieving health related Millennium Development Goal (MDG) targets. Lack of coherence between provisions and utilization becomes the face of the problem. Inadequacies in outreach, access and affordability coupled with escalating healthcare co...
متن کاملConventional Public Key Infrastructure: An Artefact Ill-Fitted to the Needs of the Information Society
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature technology, based on public key cryptography, has been claimed as the appropriate means of achieving this aim. Digital signatures do little, however, unless a substantial ’public key infrastructure’ (PKI) is in place to p...
متن کاملPrivacy-awareness in Blockchain-based PKI
Conventional public key infrastructure (PKI) designs are not optimal and contain security flaws; there is much work underway in improving PKI. The properties given by the Bitcoin blockchain and its derivatives are a natural solution to some of the problems with PKI in particular, certificate transparency and elimination of single points of failure. Recently-proposed blockchain PKI designs are b...
متن کاملAuthentication Re-visited: How Public Key Infrastructure Could Yet Prosper
What are the nails for which public key technologies are supposed to be the hammer? This paper examines the kinds of assertions that e-business needs to be authenticated, and evaluates conventional and alternative public key infrastructures (PKI) against those requirements. It concludes that the root cause of the limited success enjoyed by public key technologies has been inadequate requirement...
متن کامل