Title :
MBS-OCSP: an OCSP based certificate revocation system for wireless environments
Author :
Berbecaru, Diana
Author_Institution :
Dipt. di Autom. e Inf., Politecnico di Torino, Italy
Abstract :
Insofar public-key cryptography has been mostly used to provide security for applications that don\´t have constraints on bandwidth, memory or power. This type of applications (e.g. digital signature applications) or security protocols (e.g. Secure Socket Layer - SSL) typically use X.509 public-key certificates issued in the frame of public key infrastructures (PKIs). For wireless devices, the design of X.509 certificate-based secure applications is still an open issue, mostly due to the storage, network and computation limitations. One important and difficult issue that must be handled is the distribution of the current revocation status of the X.509 certificate toward the mobile client. We propose an improvement of a system (named CPC-OCSP) that is an adaptation of the OCSP protocol, one certificate revocation mechanism largely used nowadays. Our proposal, named MBS-OCSP, makes use of Merkle hash trees and is particularly appropriate for use in wireless environments where the clients are able to cache some of the received information for further re-use. Unlike other proposals, our system is flexible since clients and servers must not agree "in advance" on any parameter used for cache management. Finally, we compare our proposal with the standard revocation mechanisms (CRL and OCSP) and with CPC-OCSP in terms of the computational effort and the message size.
Keywords :
certification; client-server systems; mobile communication; open systems; protocols; public key cryptography; telecommunication security; telecommunication standards; tree data structures; MBS-OCSP certificate revocation system; Merkle hash trees; OCSP protocol; X.509 certificate; digital signature applications; mobile client; public-key cryptography; security protocols; wireless communication environments; Bandwidth; Communication system security; Cryptographic protocols; Digital signatures; Memory management; Power system security; Proposals; Public key; Public key cryptography; Sockets;
Conference_Titel :
Signal Processing and Information Technology, 2004. Proceedings of the Fourth IEEE International Symposium on
Print_ISBN :
0-7803-8689-2
DOI :
10.1109/ISSPIT.2004.1433737