Protocols for issuing public-key certificates over the Internet

نویسندگان

  • James W. Gray
  • Kin Fai Epsilon Ip
چکیده

Until recently, public-key certiicate issuance has involved verifying users' identities and public keys over a separate|and presumably secure|channel, such as in person or over the phone. However, the recent draft SET speciication has changed that with a protocol for issuing public-key certiicates to credit card holders in an interaction that takes place entirely over the Internet. We describe the security concerns of protocols for public-key certiicate issuance. These concerns include US export controls, weak DES encryp-tion, and ooine guessing attacks. We motivate and describe two protocols that have appeared in drafts of the SET speciication. Plus, we describe a new protocol for public-key certiication issuance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protection Profiles for Certificate Issuing & Management Systems

At the heart of many recent efforts to improve Internet security are a group of security protocols such as S/MIME, TLS, and IPSec. All of these protocols rely on public-key cryptography to help provide services such as confidentiality, data integrity, data origin authentication, and non-repudiation. Support for this public-key cryptography is provided by a Public Key Infrastructure, or PKI. The...

متن کامل

Protocols for Issuing Public - Key Certi catesover the

Until recently, public-key certiicate issuance has involved verifying users' identities and public keys over a separate|and presumably secure|channel, such as in person or over the phone. However, the recent draft SET speciication has changed that with a protocol for issuing public-key certiicates to credit card holders in an interaction that takes place entirely over the Internet. We describe ...

متن کامل

Secret-key Certificates (continued) Secret-key Certiicates (continued)

A new construction is described for designing secret-key certiicate schemes based on signature schemes other than of the Fiat-Shamir type. Also described are practical secret-key certiicate issuing protocols that enable the Certiication Authority to certify public keys, without being able to compromise the conndentiality of the corresponding secret keys. Furthermore the design of secure showing...

متن کامل

Certificate Management in Ad Hoc Networks

Various types of certificates are basic tools of modern cryptography and networks security. They are used in various protocols, in the form of public key identity certificates, binding a key to its owner or in the form of attribute certificates, being a proof of rights and capabilities of their owner. Management of certificates (creation, distribution, verification, and revocation) is dependent...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997