Attack-Resilient TLS Certificate Transparency

The security of Public-Key Infrastructure (PKI) for Internet-based communications has lately attracted researchers' attention because of Certification Authorities (CAs) crashes and consequent attacks. Google Certificate Transparency and subsequent log-based PKI proposals (e.g., AKI and ARPKI) h...

Full description

Bibliographic Details
Main Authors: Salabat Khan, Liehuang Zhu, Zijian Zhang, Mussadiq Abdul Rahim, Khalid Khan, Meng Li
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9099233/
_version_ 1818379549965025280
author Salabat Khan
Liehuang Zhu
Zijian Zhang
Mussadiq Abdul Rahim
Khalid Khan
Meng Li
author_facet Salabat Khan
Liehuang Zhu
Zijian Zhang
Mussadiq Abdul Rahim
Khalid Khan
Meng Li
author_sort Salabat Khan
collection DOAJ
description The security of Public-Key Infrastructure (PKI) for Internet-based communications has lately attracted researchers' attention because of Certification Authorities (CAs) crashes and consequent attacks. Google Certificate Transparency and subsequent log-based PKI proposals (e.g., AKI and ARPKI) have succeeded in making certificate-management processes more transparent, accountable, and verifiable. However, those proposals failed to solve the root CA generous delegation of trust to intermediate CAs, non-conformant certificate-issuance by them, and lack of rigorous authentication of domain ownership during certificate-issuance problems. This study presents Attack-Resilient TLS Certificate Transparency (ARCT) based on log servers to address these problems. ARCT enables root CA to enforce intermediate CAs to follow community standards through leveraging a log server at each root level. It also introduces a collaborative domain ownership verification method that deters false certificate-issuance and ensures that a set of CAs validates every certificate before any client will accept it. A certificate collectively approved by a set of CAs assures users that the certificate has been seen, and not instantly detected malicious, by a group of CAs. Finally, formal security and performance evaluations prove the reliability and effectiveness of ARCT.
first_indexed 2024-12-14T02:04:34Z
format Article
id doaj.art-b8f73fd6306446a998d3b4a253abb711
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-14T02:04:34Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-b8f73fd6306446a998d3b4a253abb7112022-12-21T23:20:55ZengIEEEIEEE Access2169-35362020-01-018989589897310.1109/ACCESS.2020.29969979099233Attack-Resilient TLS Certificate TransparencySalabat Khan0https://orcid.org/0000-0003-1470-0529Liehuang Zhu1https://orcid.org/0000-0003-3277-3887Zijian Zhang2https://orcid.org/0000-0002-6313-4407Mussadiq Abdul Rahim3Khalid Khan4Meng Li5School of Computer Science and Technology, Beijing Institute of Technology, Beijing, ChinaSchool of Computer Science and Technology, Beijing Institute of Technology, Beijing, ChinaSchool of Computer Science and Technology, Beijing Institute of Technology, Beijing, ChinaSchool of Computer Science and Technology, Beijing Institute of Technology, Beijing, ChinaKohat University of Science and Technology, Kohat, PakistanSchool of Computer Science and Information Engineering, Hefei University of Technology, Hefei, ChinaThe security of Public-Key Infrastructure (PKI) for Internet-based communications has lately attracted researchers' attention because of Certification Authorities (CAs) crashes and consequent attacks. Google Certificate Transparency and subsequent log-based PKI proposals (e.g., AKI and ARPKI) have succeeded in making certificate-management processes more transparent, accountable, and verifiable. However, those proposals failed to solve the root CA generous delegation of trust to intermediate CAs, non-conformant certificate-issuance by them, and lack of rigorous authentication of domain ownership during certificate-issuance problems. This study presents Attack-Resilient TLS Certificate Transparency (ARCT) based on log servers to address these problems. ARCT enables root CA to enforce intermediate CAs to follow community standards through leveraging a log server at each root level. It also introduces a collaborative domain ownership verification method that deters false certificate-issuance and ensures that a set of CAs validates every certificate before any client will accept it. A certificate collectively approved by a set of CAs assures users that the certificate has been seen, and not instantly detected malicious, by a group of CAs. Finally, formal security and performance evaluations prove the reliability and effectiveness of ARCT.https://ieeexplore.ieee.org/document/9099233/TLSPKIlog serverdelegation of trustcollaborative identity verification
spellingShingle Salabat Khan
Liehuang Zhu
Zijian Zhang
Mussadiq Abdul Rahim
Khalid Khan
Meng Li
Attack-Resilient TLS Certificate Transparency
IEEE Access
TLS
PKI
log server
delegation of trust
collaborative identity verification
title Attack-Resilient TLS Certificate Transparency
title_full Attack-Resilient TLS Certificate Transparency
title_fullStr Attack-Resilient TLS Certificate Transparency
title_full_unstemmed Attack-Resilient TLS Certificate Transparency
title_short Attack-Resilient TLS Certificate Transparency
title_sort attack resilient tls certificate transparency
topic TLS
PKI
log server
delegation of trust
collaborative identity verification
url https://ieeexplore.ieee.org/document/9099233/
work_keys_str_mv AT salabatkhan attackresilienttlscertificatetransparency
AT liehuangzhu attackresilienttlscertificatetransparency
AT zijianzhang attackresilienttlscertificatetransparency
AT mussadiqabdulrahim attackresilienttlscertificatetransparency
AT khalidkhan attackresilienttlscertificatetransparency
AT mengli attackresilienttlscertificatetransparency