Security of Certificate Transparency

<p>Certificate Transparency is one of a number of recent proposals to improve the public key infrastructure of the Internet, all based on the use of public, verifiable log servers to store records of certain actions. Whilst it lacks some features of alternative systems, such as handling revoca...

Full description

Bibliographic Details
Main Author: Cohn-Gordon, K
Format: Working paper
Language:English
Published: 2015
Subjects:
_version_ 1797074167559880704
author Cohn-Gordon, K
author_facet Cohn-Gordon, K
author_sort Cohn-Gordon, K
collection OXFORD
description <p>Certificate Transparency is one of a number of recent proposals to improve the public key infrastructure of the Internet, all based on the use of public, verifiable log servers to store records of certain actions. Whilst it lacks some features of alternative systems, such as handling revocation or permitting distributed verification, Certificate Transparency has the significant advantage of support from the Chromium web browser team, and thus will be enabled for large parts of the Internet by early 2015.</p> <p>In this report we present an initial, informal security analysis of Certificate Transparency, identifying the implicit assumptions made elsewhere and describing the adversaries which is it designed to resist as well as those which it is not. We also suggest how this analysis could be formalised in future work, linking it to recent research on PKI in Bellare-Rogaway-style security games.</p>
first_indexed 2024-03-06T23:32:27Z
format Working paper
id oxford-uuid:6c85dda3-628a-40b7-87a0-621c3c952c62
institution University of Oxford
language English
last_indexed 2024-03-06T23:32:27Z
publishDate 2015
record_format dspace
spelling oxford-uuid:6c85dda3-628a-40b7-87a0-621c3c952c622022-03-26T19:11:20ZSecurity of Certificate TransparencyWorking paperhttp://purl.org/coar/resource_type/c_8042uuid:6c85dda3-628a-40b7-87a0-621c3c952c62Cyber SecurityComputer securityComputingEnglishOxford University Research Archive - Valet2015Cohn-Gordon, K<p>Certificate Transparency is one of a number of recent proposals to improve the public key infrastructure of the Internet, all based on the use of public, verifiable log servers to store records of certain actions. Whilst it lacks some features of alternative systems, such as handling revocation or permitting distributed verification, Certificate Transparency has the significant advantage of support from the Chromium web browser team, and thus will be enabled for large parts of the Internet by early 2015.</p> <p>In this report we present an initial, informal security analysis of Certificate Transparency, identifying the implicit assumptions made elsewhere and describing the adversaries which is it designed to resist as well as those which it is not. We also suggest how this analysis could be formalised in future work, linking it to recent research on PKI in Bellare-Rogaway-style security games.</p>
spellingShingle Cyber Security
Computer security
Computing
Cohn-Gordon, K
Security of Certificate Transparency
title Security of Certificate Transparency
title_full Security of Certificate Transparency
title_fullStr Security of Certificate Transparency
title_full_unstemmed Security of Certificate Transparency
title_short Security of Certificate Transparency
title_sort security of certificate transparency
topic Cyber Security
Computer security
Computing
work_keys_str_mv AT cohngordonk securityofcertificatetransparency