Security and Trust of Public Key Cryptography for HIP and HIP Multicast
Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a H...
Gespeichert in:
Veröffentlicht in: | International journal of dependable and trustworthy information systems 2011-07, Vol.2 (3), p.17-35 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 35 |
---|---|
container_issue | 3 |
container_start_page | 17 |
container_title | International journal of dependable and trustworthy information systems |
container_volume | 2 |
creator | K.C, Amir Forsgren, Harri Grahn, Kaj Karvi, Timo Pulkkis, Göran |
description | Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified. |
doi_str_mv | 10.4018/jdtis.2011070102 |
format | Article |
fullrecord | <record><control><sourceid>proquest_igi_j</sourceid><recordid>TN_cdi_proquest_miscellaneous_1551051891</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1551051891</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1701-19d0040af1833506ae63f4f27c35151a8eb5adc9b4b342f38afc104b56ccfaf83</originalsourceid><addsrcrecordid>eNp1kLtPwzAQhy0EEhV0Z_TI0nIX23mMqKIPUUQlymw5jl1cpU2wkyH_PWmL6ADc8rvh0z0-Qu4QxhwwfdgWjQvjCBAhAYToggww48kogzi7_OkFXJNhCFvoS_AkYWxAZm9Gt941HVX7gq59GxpaWbpq89Jp-mw6OvFd3VQbr-qPjtrK0_lidYQP-dKWjdMqNLfkyqoymOF33pD36dN6Mh8tX2eLyeNypLG_bIRZAcBBWUwZExArEzPLbZRoJlCgSk0uVKGznOeMR5alymoEnotYa6tsym7I_Wlu7avP1oRG7lzQpizV3lRtkCgEgsA0wx6FE6p9FYI3Vtbe7ZTvJII8aJNHbfKs7TzdbZzcVq3f97_8wmRd2B6d_oEeTMpejjyalJWVJ5P_rozYF0iZhUA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1551051891</pqid></control><display><type>article</type><title>Security and Trust of Public Key Cryptography for HIP and HIP Multicast</title><source>Alma/SFX Local Collection</source><creator>K.C, Amir ; Forsgren, Harri ; Grahn, Kaj ; Karvi, Timo ; Pulkkis, Göran</creator><creatorcontrib>K.C, Amir ; Forsgren, Harri ; Grahn, Kaj ; Karvi, Timo ; Pulkkis, Göran</creatorcontrib><description>Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.</description><identifier>ISSN: 1947-9050</identifier><identifier>EISSN: 1947-9069</identifier><identifier>DOI: 10.4018/jdtis.2011070102</identifier><language>eng</language><subject>Cation exchanging ; Certificates ; Cryptography ; Hot isostatic pressing ; IP (Internet Protocol) ; Keys ; Multicast</subject><ispartof>International journal of dependable and trustworthy information systems, 2011-07, Vol.2 (3), p.17-35</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1701-19d0040af1833506ae63f4f27c35151a8eb5adc9b4b342f38afc104b56ccfaf83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>K.C, Amir</creatorcontrib><creatorcontrib>Forsgren, Harri</creatorcontrib><creatorcontrib>Grahn, Kaj</creatorcontrib><creatorcontrib>Karvi, Timo</creatorcontrib><creatorcontrib>Pulkkis, Göran</creatorcontrib><title>Security and Trust of Public Key Cryptography for HIP and HIP Multicast</title><title>International journal of dependable and trustworthy information systems</title><description>Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.</description><subject>Cation exchanging</subject><subject>Certificates</subject><subject>Cryptography</subject><subject>Hot isostatic pressing</subject><subject>IP (Internet Protocol)</subject><subject>Keys</subject><subject>Multicast</subject><issn>1947-9050</issn><issn>1947-9069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp1kLtPwzAQhy0EEhV0Z_TI0nIX23mMqKIPUUQlymw5jl1cpU2wkyH_PWmL6ADc8rvh0z0-Qu4QxhwwfdgWjQvjCBAhAYToggww48kogzi7_OkFXJNhCFvoS_AkYWxAZm9Gt941HVX7gq59GxpaWbpq89Jp-mw6OvFd3VQbr-qPjtrK0_lidYQP-dKWjdMqNLfkyqoymOF33pD36dN6Mh8tX2eLyeNypLG_bIRZAcBBWUwZExArEzPLbZRoJlCgSk0uVKGznOeMR5alymoEnotYa6tsym7I_Wlu7avP1oRG7lzQpizV3lRtkCgEgsA0wx6FE6p9FYI3Vtbe7ZTvJII8aJNHbfKs7TzdbZzcVq3f97_8wmRd2B6d_oEeTMpejjyalJWVJ5P_rozYF0iZhUA</recordid><startdate>20110701</startdate><enddate>20110701</enddate><creator>K.C, Amir</creator><creator>Forsgren, Harri</creator><creator>Grahn, Kaj</creator><creator>Karvi, Timo</creator><creator>Pulkkis, Göran</creator><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110701</creationdate><title>Security and Trust of Public Key Cryptography for HIP and HIP Multicast</title><author>K.C, Amir ; Forsgren, Harri ; Grahn, Kaj ; Karvi, Timo ; Pulkkis, Göran</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1701-19d0040af1833506ae63f4f27c35151a8eb5adc9b4b342f38afc104b56ccfaf83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Cation exchanging</topic><topic>Certificates</topic><topic>Cryptography</topic><topic>Hot isostatic pressing</topic><topic>IP (Internet Protocol)</topic><topic>Keys</topic><topic>Multicast</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>K.C, Amir</creatorcontrib><creatorcontrib>Forsgren, Harri</creatorcontrib><creatorcontrib>Grahn, Kaj</creatorcontrib><creatorcontrib>Karvi, Timo</creatorcontrib><creatorcontrib>Pulkkis, Göran</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of dependable and trustworthy information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>K.C, Amir</au><au>Forsgren, Harri</au><au>Grahn, Kaj</au><au>Karvi, Timo</au><au>Pulkkis, Göran</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security and Trust of Public Key Cryptography for HIP and HIP Multicast</atitle><jtitle>International journal of dependable and trustworthy information systems</jtitle><date>2011-07-01</date><risdate>2011</risdate><volume>2</volume><issue>3</issue><spage>17</spage><epage>35</epage><pages>17-35</pages><issn>1947-9050</issn><eissn>1947-9069</eissn><abstract>Host Identity Protocol (HIP) gives cryptographically verifiable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and verified with public keys. Even if this system is quite secure, there is some vulnerability concerning the authenticity of public keys. The authors examine some possibilities to derive trust in public parameters. These are DNSSEC and public key certificates (PKI). Especially, the authors examine how to implement certificate handling and what is the time complexity of using and verifying certificates in the HIP Base Exchange. It turned out that certificates delayed the HIP Base Exchange only some milliseconds compared to the case where certificates are not used. In the latter part of our article the authors analyze four proposed HIP multicast models and how they could use certificates. There are differences in the models how many times the Base Exchange is performed and to what extent existing HIP specification standards must be modified.</abstract><doi>10.4018/jdtis.2011070102</doi><tpages>19</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1947-9050 |
ispartof | International journal of dependable and trustworthy information systems, 2011-07, Vol.2 (3), p.17-35 |
issn | 1947-9050 1947-9069 |
language | eng |
recordid | cdi_proquest_miscellaneous_1551051891 |
source | Alma/SFX Local Collection |
subjects | Cation exchanging Certificates Cryptography Hot isostatic pressing IP (Internet Protocol) Keys Multicast |
title | Security and Trust of Public Key Cryptography for HIP and HIP Multicast |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T19%3A20%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_igi_j&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20and%20Trust%20of%20Public%20Key%20Cryptography%20for%20HIP%20and%20HIP%20Multicast&rft.jtitle=International%20journal%20of%20dependable%20and%20trustworthy%20information%20systems&rft.au=K.C,%20Amir&rft.date=2011-07-01&rft.volume=2&rft.issue=3&rft.spage=17&rft.epage=35&rft.pages=17-35&rft.issn=1947-9050&rft.eissn=1947-9069&rft_id=info:doi/10.4018/jdtis.2011070102&rft_dat=%3Cproquest_igi_j%3E1551051891%3C/proquest_igi_j%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1551051891&rft_id=info:pmid/&rfr_iscdi=true |