首页> 外文会议>Public key infrastructures, services and applications >Observations on Certification Authority Key Compromise
【24h】

Observations on Certification Authority Key Compromise

机译:关于证书颁发机构密钥泄露的意见

获取原文
获取原文并翻译 | 示例

摘要

The most critical requirement for a Certification Authority (CA) is to protect its signing key from compromise. CA keys are typically stored in tamper resistant Hardware Security Modules (HSM). While, in a realistic deployment, the HSM may prevent the full copy of the key to be copied or stolen, it can not totally prevent illegal access to the key (due to compromise or even operator mistakes). This paper defines multiple compromise levels for the CA key and investigates the damages in each level. First, we show that with the most common revocation setting even the lowest compromise level (a single illegal access) may lead to the end of the CA. Then, we show that other revocation settings permit efficient countermeasures to prevent the revocation of the CA in some compromise levels. Finally, we describe some hints about the implementation of these settings in practice.
机译:证书颁发机构(CA)的最关键要求是保护其签名密钥不受损害。 CA密钥通常存储在防篡改的硬件安全模块(HSM)中。虽然在实际部署中,HSM可能会阻止密钥的完整副本被复制或被盗,但它不能完全防止对密钥的非法访问(由于折衷甚至是操作员失误)。本文为CA密钥定义了多个折衷级别,并调查了每个级别的破坏程度。首先,我们表明,使用最常见的撤消设置,即使最低的危害级别(单个非法访问)也可能导致CA终止。然后,我们表明其他吊销设置允许采取有效的对策,以防止在某些折衷水平下吊销CA。最后,我们描述了有关在实践中实施这些设置的一些提示。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号