Hardening X.509 Certificate Issuance using Distributed Ledger Technology

被引:0
|
作者
Kinkelin, Holger [1 ]
von Seck, Richard [1 ]
Rudolf, Christoph [1 ]
Carle, Georg [1 ]
机构
[1] Tech Univ Munich, Dept Informat, Chair Network Architectures & Serv, D-85748 Garching, Germany
来源
NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE | 2020年
关键词
Identity management; X.509; distributed ledger; policy-based security;
D O I
10.1109/noms47738.2020.9110311
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of cryptographic communication protocols that use X.509 certificates depends on the correctness of those certificates. This paper proposes a system that helps to ensure the correct operation of an X.509 certification authority and its registration authorities. We achieve this goal by enforcing a policy-defined, multi-party validation and authorization workflow of certificate signing requests. Besides, our system offers full accountability for this workflow for forensic purposes. As a foundation for our implementation, we leverage the distributed ledger and smart contract framework Hyperledger Fabric. Our implementation inherits the strong tamper-resistance of Fabric which strengthens the integrity of the computer processes that enforce the validation and authorization of the certificate signing request, and of the metadata collected during certificate issuance.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] The X.509 Certificate Quality
    Wazan, Ahmad Samer
    Laborde, Romain
    Barrere, Francois
    Benzekri, Abdelmalek
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 953 - 955
  • [2] X.509 Certificate Error Testing
    McLuskie, D.
    Belleken, X.
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [3] An improvement for X.509 digital certificate based on XML signature technology
    Liu, Baolong
    Chen, Hua
    Guo, Yi
    ICIC Express Letters, Part B: Applications, 2012, 3 (02): : 425 - 429
  • [4] Recursive certificate structures for X.509 systems
    Russell, S
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 135 - 148
  • [5] A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies
    Khan, Salabat
    Luo, Fei
    Zhang, Zijian
    Ullah, Farhan
    Amin, Farhan
    Qadri, Syed Furqan
    Bin Heyat, Md Belal
    Ruby, Rukhsana
    Wang, Lu
    Ullah, Shamsher
    Li, Meng
    Leung, Victor C. M.
    Wu, Kaishun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2529 - 2568
  • [6] Coveringcerts: Combinatorial Methods for X.509 Certificate Testing
    Kleine, Kristoffer
    Simos, Dimitris E.
    2017 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2017, : 69 - 79
  • [7] Speeding up X.509 Certificate Path Validation
    Hane, Shingo
    Fujishiro, Takahiro
    Hashimoto, Yoko
    Kaji, Tadashi
    Katsuhiko, Kondo
    Tezuka, Satoru
    APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 197 - 206
  • [8] X.509 certificate-based adult authentication
    Korea Information Security Agency, 78, Garak-dong, Songpa-Gu, Seoul 138-803, Korea, Republic of
    不详
    WSEAS Trans. Inf. Sci. Appl., 2006, 5 (894-898):
  • [9] A formal model of trust for calculating the quality of X.509 certificate
    Samer, Wazan Ahmad
    Romain, Laborde
    Francois, Barrere
    AbdelMalek, Benzekri
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (06) : 651 - 665
  • [10] The Prediction of Serial Number in OpenSSL's X.509 Certificate
    Wang, Jizhi
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019