Plug-and-Play PKI: A PKI Your Mother Can Use
نویسنده
چکیده
A common complaint about PKI is that it is simply too hard to use at the end-user level. Somewhat surprisingly, there exists no PKI equivalent of DHCP or BOOTP for automated, transparent PKI setup, leaving the certificate user experience similar to the process of bringing up an X.25 link. This paper provides a PKI equivalent of these basic bootstrap services that provides automatic, transparent configuration and setup of certificate information, with the user needing to supply no more than their user name and password. The work covers the design process involved and tradeoffs made, implementation details, and experiences with actual operation. The overall purpose of the work is to design and implement a plug-and-play certificate setup mechanism usable by even the most inexperienced user, a “PKI your mother can use”.
منابع مشابه
Flexible certificate management in public key infrastructures
A public key infrastructure (PKI) secures lots of applications and processes. These are for example the electronic commerce, email communication, access to computers and networks, or digital identities for use in e-Government or the health care sector. The various PKI based applications have different requirements. These depend on the security level, the number of participants, the software or ...
متن کاملA QSAR Study of HIV Protease Inhibitors Using Computational Descriptors to Prediction of pki of Cycle Derivatives of Urea
Preventing and reducing the spread of HIV (HIV) has always been a concern in medical science. One of the most common ways to control the virus is using enzyme-blocking drugs. In this study, we attempted to predict the biological activity (PKi) of organic urea derivatives in protease inhibitor compounds using molecular modeling using QSAR (Quantitative Structure Activity Relation), which is the ...
متن کاملStepping Beyond the PKI Pilot
Despite much of the negative publicity that it has suffered recently, Public Key Infrastructure (PKI) continues to play a critical role in underpinning security on the Internet and other potentially hostile network environments. In such environments, it is common to deploy secure protocols to deliver one or more standard network security services (authentication, confidentiality protection, int...
متن کاملIntrusion-Tolerant Password-Enabled PKI
Password-enabled PKI facilitates the private key management by integrating easy-to-use passwords into PKI. In the first PKI research workshop, Sandhu et al. categorized password-enabled PKI schemes as virtual soft tokens and virtual smartcards [26]. Compared to the conventional PKI, password-enabled PKI introduces a security-critical server where large number of password-related credentials are...
متن کاملرمزنگاری مبتنی بر شناسه در شبکههای حسگر بیسیم
در سالهای اخیر برای حل مشکل توزیع کلید و تعداد زیاد کلیدهای ذخیره شده در شبکههای حسگر بیسیم از رمزنگاری کلید عمومی استفاده شد. در این شبکهها از ین نوع رمزنگاری برای انجام احراز اصالت و توافق کلید بهره گرفته شده است. پر کاربردترین رمزنگاری کلید عمومی که مبتنی بر گواهی است از زیر ساخت کلید عمومی (PKI) استفاده میکند. همان طور که میدانیم برای پیادهسازی PKI نیازمند میزان قابل توجهی حافظه، ...
متن کامل