Protocols for issuing public-key certificates over the Internet
نویسندگان
چکیده
Until recently, public-key certiicate issuance has involved verifying users' identities and public keys over a separate|and presumably secure|channel, such as in person or over the phone. However, the recent draft SET speciication has changed that with a protocol for issuing public-key certiicates to credit card holders in an interaction that takes place entirely over the Internet. We describe the security concerns of protocols for public-key certiicate issuance. These concerns include US export controls, weak DES encryp-tion, and ooine guessing attacks. We motivate and describe two protocols that have appeared in drafts of the SET speciication. Plus, we describe a new protocol for public-key certiication issuance.
منابع مشابه
Protection Profiles for Certificate Issuing & Management Systems
At the heart of many recent efforts to improve Internet security are a group of security protocols such as S/MIME, TLS, and IPSec. All of these protocols rely on public-key cryptography to help provide services such as confidentiality, data integrity, data origin authentication, and non-repudiation. Support for this public-key cryptography is provided by a Public Key Infrastructure, or PKI. The...
متن کاملProtocols for Issuing Public - Key Certi catesover the
Until recently, public-key certiicate issuance has involved verifying users' identities and public keys over a separate|and presumably secure|channel, such as in person or over the phone. However, the recent draft SET speciication has changed that with a protocol for issuing public-key certiicates to credit card holders in an interaction that takes place entirely over the Internet. We describe ...
متن کاملSecret-key Certificates (continued) Secret-key Certiicates (continued)
A new construction is described for designing secret-key certiicate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certiicate issuing protocols that enable the Certiication Authority to certify public keys, without being able to compromise the conndentiality of the corresponding secret keys. Furthermore the design of secure showing...
متن کاملCertificate Management in Ad Hoc Networks
Various types of certificates are basic tools of modern cryptography and networks security. They are used in various protocols, in the form of public key identity certificates, binding a key to its owner or in the form of attribute certificates, being a proof of rights and capabilities of their owner. Management of certificates (creation, distribution, verification, and revocation) is dependent...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل