{"title":"A delayed commitment scheme to enhance public key certificate based protocols","authors":"Wu Wen","doi":"10.1109/ENABL.2000.883725","DOIUrl":null,"url":null,"abstract":"Public key certificate based protocols depend on the freshness of the certificates for their security. It has been pointed out by various authors that current Public Key Infrastructure (PKI) does not provide effective freshness proof for certificates. An \"ex-employee\" who has access to the private key of a compromised server certificate can mount an attack on the SSL/TLS hand-shake protocol and eavesdrop the subsequent secret communication even if the server uses a fresh certificate. In this paper we propose an improved handshake protocol which requires minimum change to the current SSL/TLS handshake protocol, yet practically prevent the above \"ex-employee\" attack.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ENABL.2000.883725","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Public key certificate based protocols depend on the freshness of the certificates for their security. It has been pointed out by various authors that current Public Key Infrastructure (PKI) does not provide effective freshness proof for certificates. An "ex-employee" who has access to the private key of a compromised server certificate can mount an attack on the SSL/TLS hand-shake protocol and eavesdrop the subsequent secret communication even if the server uses a fresh certificate. In this paper we propose an improved handshake protocol which requires minimum change to the current SSL/TLS handshake protocol, yet practically prevent the above "ex-employee" attack.