Optimization of a Public Key Infrastructure

被引:0
|
作者
Fongen, Anders [1 ]
机构
[1] Norwegian Def Res Estab, Kjeller, Norway
关键词
Public Key Cryptography; Scalability; Optimization;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The traffic patterns related to operation of a Public Key Infrastructure (PKI) can be modeled and optimized. Even though PKI has been around for three decades, relatively few results have been presented on this matter. The contribution of this paper is a PKI traffic model based on observation of familiar use cases together with hypotheses from scale free graph theory. Based on a set of estimated parameters, an optimized organization of a PKI is proposed. One key element has been to avoid costly revocation mechanisms. The proposed solution includes the use of short lived certificates which do not need a revocation mechanism, and the use of cached validation proofs to save protocol round trips. PKI also presents special challenges during operation in tactical wireless networks. Reduced bandwidth and connectivity requirements are commonly considered as essential properties for a successful tactical application. The paper also proposes an organization of a PKI for a mixed tactical/strategic network.
引用
收藏
页码:1440 / 1447
页数:8
相关论文
共 50 条
  • [1] The Internet public key infrastructure
    Benantar, M
    IBM SYSTEMS JOURNAL, 2001, 40 (03) : 648 - 665
  • [2] An Enhanced Public Key Infrastructure
    Lim, Boon-Hock
    Tan, Syh-Yuan
    Yau, Wei-Chuen
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [3] Unified Public Key Infrastructure
    Efimov, IN
    Galkin, OI
    Mescheriakov, RV
    EDM 2005: International Workshop and Tutorials on Electron Devices and Materials, Proceedings, 2005, : 240 - 242
  • [4] Public Key Infrastructure for Public Administration in Romania
    Vatra, Nicusor
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 481 - 484
  • [5] On splitting public keys for the public key infrastructure
    Cristiano, S
    Liu, FF
    2005 IEEE INTERNATIONAL CONFERENCE ON E-TECHNOLOGY, E-COMMERCE AND E-SERVICE, PROCEEDINGS, 2005, : 112 - 115
  • [6] On the release of CRLs in public key infrastructure
    Ma, Chengyu
    Hu, Nan
    Li, Yingjiu
    USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, 2006, : 17 - 28
  • [7] Public key infrastructure - Enabled services
    Karagodin, AM
    Korus 2005, Proceedings, 2005, : 989 - 994
  • [8] An anatomy of trust in public key infrastructure
    Huang J.
    Nicol D.M.
    International Journal of Critical Infrastructures, 2017, 13 (2-3) : 238 - 258
  • [9] A wearable public key infrastructure (WPKI)
    Smart, NP
    Muller, HL
    FOURTH INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, DIGEST OF PAPERS, 2000, : 127 - 133
  • [10] An implementation of enhanced public key infrastructure
    Tan, Syh-Yuan
    Yau, Wei-Chuen
    Lim, Boon-Hock
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (16) : 6481 - 6495