Scalability analysis of selected certificate validation scenarios

A. Fongen
{"title":"Scalability analysis of selected certificate validation scenarios","authors":"A. Fongen","doi":"10.1109/MILCOM.2010.5680490","DOIUrl":null,"url":null,"abstract":"The use of public key based cryptographic algorithms enables new applications for encryption and digital signatures, and offers solution to a range of authentication and information integrity problems. One cause of concern regarding public key cryptography is the amount of computational and network resources required for key management. Although this has been a research focus for some time, little work has been done to formally analyze the scalability properties of the key management procedures. The purpose of this paper is to offer an analysis of certificate validation operations from a scalability perspective. Furthermore, the focus of the analysis is on client side data rates. This focus has been chosen since the capacity of the network closest to the clients is scarce and likely to be a bottleneck. This is particularly true when the clients are connected through a wireless tactical network.","PeriodicalId":330937,"journal":{"name":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2010.5680490","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

The use of public key based cryptographic algorithms enables new applications for encryption and digital signatures, and offers solution to a range of authentication and information integrity problems. One cause of concern regarding public key cryptography is the amount of computational and network resources required for key management. Although this has been a research focus for some time, little work has been done to formally analyze the scalability properties of the key management procedures. The purpose of this paper is to offer an analysis of certificate validation operations from a scalability perspective. Furthermore, the focus of the analysis is on client side data rates. This focus has been chosen since the capacity of the network closest to the clients is scarce and likely to be a bottleneck. This is particularly true when the clients are connected through a wireless tactical network.
选定证书验证方案的可伸缩性分析
基于公钥的加密算法的使用为加密和数字签名提供了新的应用,并为一系列身份验证和信息完整性问题提供了解决方案。关注公钥加密的一个原因是密钥管理所需的计算和网络资源的数量。虽然这已经成为一段时间以来的研究焦点,但很少有人正式分析密钥管理过程的可伸缩性属性。本文的目的是从可伸缩性的角度对证书验证操作进行分析。此外,分析的重点是客户端数据速率。之所以选择这个重点,是因为离客户端最近的网络容量很少,很可能成为瓶颈。当客户端通过无线战术网络连接时尤其如此。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信