Security and Trust of Public Key Cryptography for HIP and HIP Multicast

Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a H...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of dependable and trustworthy information systems 2011-07, Vol.2 (3), p.17-35
Hauptverfasser: K.C, Amir, Forsgren, Harri, Grahn, Kaj, Karvi, Timo, Pulkkis, Göran
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 35
container_issue 3
container_start_page 17
container_title International journal of dependable and trustworthy information systems
container_volume 2
creator K.C, Amir
Forsgren, Harri
Grahn, Kaj
Karvi, Timo
Pulkkis, Göran
description Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.
doi_str_mv 10.4018/jdtis.2011070102
format Article
fullrecord <record><control><sourceid>proquest_igi_j</sourceid><recordid>TN_cdi_proquest_miscellaneous_1551051891</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1551051891</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1701-19d0040af1833506ae63f4f27c35151a8eb5adc9b4b342f38afc104b56ccfaf83</originalsourceid><addsrcrecordid>eNp1kLtPwzAQhy0EEhV0Z_TI0nIX23mMqKIPUUQlymw5jl1cpU2wkyH_PWmL6ADc8rvh0z0-Qu4QxhwwfdgWjQvjCBAhAYToggww48kogzi7_OkFXJNhCFvoS_AkYWxAZm9Gt941HVX7gq59GxpaWbpq89Jp-mw6OvFd3VQbr-qPjtrK0_lidYQP-dKWjdMqNLfkyqoymOF33pD36dN6Mh8tX2eLyeNypLG_bIRZAcBBWUwZExArEzPLbZRoJlCgSk0uVKGznOeMR5alymoEnotYa6tsym7I_Wlu7avP1oRG7lzQpizV3lRtkCgEgsA0wx6FE6p9FYI3Vtbe7ZTvJII8aJNHbfKs7TzdbZzcVq3f97_8wmRd2B6d_oEeTMpejjyalJWVJ5P_rozYF0iZhUA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1551051891</pqid></control><display><type>article</type><title>Security and Trust of Public Key Cryptography for HIP and HIP Multicast</title><source>Alma/SFX Local Collection</source><creator>K.C, Amir ; Forsgren, Harri ; Grahn, Kaj ; Karvi, Timo ; Pulkkis, Göran</creator><creatorcontrib>K.C, Amir ; Forsgren, Harri ; Grahn, Kaj ; Karvi, Timo ; Pulkkis, Göran</creatorcontrib><description>Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.</description><identifier>ISSN: 1947-9050</identifier><identifier>EISSN: 1947-9069</identifier><identifier>DOI: 10.4018/jdtis.2011070102</identifier><language>eng</language><subject>Cation exchanging ; Certificates ; Cryptography ; Hot isostatic pressing ; IP (Internet Protocol) ; Keys ; Multicast</subject><ispartof>International journal of dependable and trustworthy information systems, 2011-07, Vol.2 (3), p.17-35</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1701-19d0040af1833506ae63f4f27c35151a8eb5adc9b4b342f38afc104b56ccfaf83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>K.C, Amir</creatorcontrib><creatorcontrib>Forsgren, Harri</creatorcontrib><creatorcontrib>Grahn, Kaj</creatorcontrib><creatorcontrib>Karvi, Timo</creatorcontrib><creatorcontrib>Pulkkis, Göran</creatorcontrib><title>Security and Trust of Public Key Cryptography for HIP and HIP Multicast</title><title>International journal of dependable and trustworthy information systems</title><description>Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.</description><subject>Cation exchanging</subject><subject>Certificates</subject><subject>Cryptography</subject><subject>Hot isostatic pressing</subject><subject>IP (Internet Protocol)</subject><subject>Keys</subject><subject>Multicast</subject><issn>1947-9050</issn><issn>1947-9069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp1kLtPwzAQhy0EEhV0Z_TI0nIX23mMqKIPUUQlymw5jl1cpU2wkyH_PWmL6ADc8rvh0z0-Qu4QxhwwfdgWjQvjCBAhAYToggww48kogzi7_OkFXJNhCFvoS_AkYWxAZm9Gt941HVX7gq59GxpaWbpq89Jp-mw6OvFd3VQbr-qPjtrK0_lidYQP-dKWjdMqNLfkyqoymOF33pD36dN6Mh8tX2eLyeNypLG_bIRZAcBBWUwZExArEzPLbZRoJlCgSk0uVKGznOeMR5alymoEnotYa6tsym7I_Wlu7avP1oRG7lzQpizV3lRtkCgEgsA0wx6FE6p9FYI3Vtbe7ZTvJII8aJNHbfKs7TzdbZzcVq3f97_8wmRd2B6d_oEeTMpejjyalJWVJ5P_rozYF0iZhUA</recordid><startdate>20110701</startdate><enddate>20110701</enddate><creator>K.C, Amir</creator><creator>Forsgren, Harri</creator><creator>Grahn, Kaj</creator><creator>Karvi, Timo</creator><creator>Pulkkis, Göran</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110701</creationdate><title>Security and Trust of Public Key Cryptography for HIP and HIP Multicast</title><author>K.C, Amir ; Forsgren, Harri ; Grahn, Kaj ; Karvi, Timo ; Pulkkis, Göran</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1701-19d0040af1833506ae63f4f27c35151a8eb5adc9b4b342f38afc104b56ccfaf83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Cation exchanging</topic><topic>Certificates</topic><topic>Cryptography</topic><topic>Hot isostatic pressing</topic><topic>IP (Internet Protocol)</topic><topic>Keys</topic><topic>Multicast</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>K.C, Amir</creatorcontrib><creatorcontrib>Forsgren, Harri</creatorcontrib><creatorcontrib>Grahn, Kaj</creatorcontrib><creatorcontrib>Karvi, Timo</creatorcontrib><creatorcontrib>Pulkkis, Göran</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of dependable and trustworthy information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>K.C, Amir</au><au>Forsgren, Harri</au><au>Grahn, Kaj</au><au>Karvi, Timo</au><au>Pulkkis, Göran</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security and Trust of Public Key Cryptography for HIP and HIP Multicast</atitle><jtitle>International journal of dependable and trustworthy information systems</jtitle><date>2011-07-01</date><risdate>2011</risdate><volume>2</volume><issue>3</issue><spage>17</spage><epage>35</epage><pages>17-35</pages><issn>1947-9050</issn><eissn>1947-9069</eissn><abstract>Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.</abstract><doi>10.4018/jdtis.2011070102</doi><tpages>19</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1947-9050
ispartof International journal of dependable and trustworthy information systems, 2011-07, Vol.2 (3), p.17-35
issn 1947-9050
1947-9069
language eng
recordid cdi_proquest_miscellaneous_1551051891
source Alma/SFX Local Collection
subjects Cation exchanging
Certificates
Cryptography
Hot isostatic pressing
IP (Internet Protocol)
Keys
Multicast
title Security and Trust of Public Key Cryptography for HIP and HIP Multicast
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T19%3A20%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_igi_j&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20and%20Trust%20of%20Public%20Key%20Cryptography%20for%20HIP%20and%20HIP%20Multicast&rft.jtitle=International%20journal%20of%20dependable%20and%20trustworthy%20information%20systems&rft.au=K.C,%20Amir&rft.date=2011-07-01&rft.volume=2&rft.issue=3&rft.spage=17&rft.epage=35&rft.pages=17-35&rft.issn=1947-9050&rft.eissn=1947-9069&rft_id=info:doi/10.4018/jdtis.2011070102&rft_dat=%3Cproquest_igi_j%3E1551051891%3C/proquest_igi_j%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1551051891&rft_id=info:pmid/&rfr_iscdi=true