Protocols for Issuing Public - Key Certi catesover the

نویسنده

  • James W. Gray
چکیده

Until recently, public-key certiicate issuance has involved verifying users' identities and public keys over a separate|and presumably secure|channel, such as in person or over the phone. However, the recent draft SET speciication has changed that with a protocol for issuing public-key certiicates to credit card holders in an interaction that takes place entirely over the Internet. We describe the security concerns of protocols for public-key certiicate issuance. These concerns include US export controls, weak DES encryp-tion, and ooine guessing attacks. We motivate and describe two protocols that have appeared in drafts of the SET speciication. Plus, we describe a new protocol for public-key certiication issuance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Transport Level Security: a proof using the Gong-Needham-Yahalom Logic

This paper provides a proof of the proposed Internet standard Transport Level Security protocol using the Gong{Needham{Yahalom logic. It is intended as a teaching aid and hopes to show to students: the potency of a formal method for protocol design; some of the subtleties of authenticating parties on a network where all messages can be intercepted; the design of what should be a widely accepted...

متن کامل

Protocols for issuing public-key certificates over the Internet

Until recently, public-key certiicate issuance has involved verifying users' identities and public keys over a separate|and presumably secure|channel, such as in person or over the phone. However, the recent draft SET speciication has changed that with a protocol for issuing public-key certiicates to credit card holders in an interaction that takes place entirely over the Internet. We describe ...

متن کامل

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves

Self-Certified keys provide an attractive alternative to traditional certificate-based public key infrastructures. Many self-certified key issuing protocols strive to blind trusted third parties to users’ private keys. One such key issuing protocol is based on the Nyberg-Rueppel signature scheme, but requires a proof of knowledge to avoid impersonation attacks. This paper describes a version of...

متن کامل

Improving Performance in Global PKI using Virtual Certi cates and Synthetic Certi cates

| A digital certi cate may be used to inform the world of the public key of its owner. To guard against impersonations and fraud, the receiver needs to perform a series of checks. When a hierarchy of certi cates is involved, and when there are large volumes of messages between two parties, as is frequent in commerce, the repeated validation of the same chain of certi cates consume signi cant re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007