检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:林璟锵[1,2] 荆继武[1,2] 张琼露 王展[1,2]
机构地区:[1]中国科学院数据与通信保护研究教育中心,北京100093 [2]中国科学院信息工程研究所,北京100093
出 处:《密码学报》2015年第6期487-496,共10页Journal of Cryptologic Research
基 金:国家重点基础研究发展项目(973计划)(2013CB338001)
摘 要:公钥基础设施(Public Key Infrastructure,PKI)是典型的密码应用技术.在PKI系统中,由证书认证机构(Certification Authority,CA)签发数字证书、绑定PKI用户的身份信息和公钥.PKI依赖方(Relying Party)预先存储有自己所信任的根CA自签名证书,用来验证与之通信的PKI用户的证书链,从而可信地获得该用户的公钥、用于各种安全服务.近5年来,随着PKI系统的深入应用,围绕各种应用场景、出现了新的技术研究成果,主要包括:SSL/TLS协议过程中的证书验证和证书管理、PKI系统的大规模实施部署、以及新的证书撤销方案.首先,在SSL/TLS协议的相关研究上,主要包括了客户端证书验证漏洞而导致的中间人攻击和相应解决方案;Certificate Transparency技术及其改进,则是考虑了被攻击CA签发虚假网站证书的威胁,公开地审计CA的证书签发过程、及时发现虚假证书;此外,通过依赖方客户端的CA证书管理,也可以有效降低CA被攻击情况下的危害.其次,PKI系统的大规模实施部署研究,主要包括跨国/跨域互操作、ICAO电子护照、互联网路由安全、互联网DNS安全等应用场景.第三,近年来的证书撤销相关研究集中在特定需求场景(RFID、电子护照、密钥托管和浏览器隐身模式等)的方案设计和分析.本文对上述PKI技术研究进展进行了详细的分析和总结.The public key infrastructure(PKI) is a typical technology of applied cryptography. In a PKI system, digital certificates are signed by certification authorities(CAs) to bind a PKI user's identity and public key. Then, using the trusted root CA's self-signed certificate, a PKI relying-party verifies the certificate chain of the PKI user,to obtain the PKI user's public key for various security services. In the recent five years, PKI technologies achieved remarkable progress as PKI systems are widely adopted in various scenarios, including:(1) certificate verification and management in SSL/TLS,(2) PKI systems deployed in large-scale applications, and(3) certification revocation solutions. Firstly, about the PKI research related to SSL/TLS, there exist man-in-the-middle attacks due to the vulnerability of certificate verification and the countermeasures; certificate transparency and its follow-ups publicly audit CAs' certificate signing operations, to detect the fake certificates signed by compromised CAs; CA certificate management in PKI clients, is also useful to mitigate the threats from compromised CAs. Secondly, PKI systems are deployed in the large-scale scenarios of cross-border/domain interoperability, ICAO e Passport, IP routing security and DNS security. Finally, recent certificate revocation solutions focus on the applications with special requirements such as RFID, e Passports, key escrow systems and private-mode browsers. This paper surveys the advances of these PKI technologies.
分 类 号:TN918.4[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222