Next: Conclusions
Up: Comparison of SEM with
Previous: Review of existing revocation
CRLs and OCSP are the most commonly deployed certificate revocation
techniques. Some positive experiments with skip-lists are reported
in [5].
We compare the SEM architecture with CRLs and OCSP. Since CRT's
and skip-lists are used in the same way as OCSP (i.e., query a VA to
obtain a proof of validity) most everything in our OCSP discussion
applies to these methods as well.
- Immediate revocation: Suppose we use CRLs for revocation.
Then, Bob verifies a signature or encrypts a message he must
first download a long CRL and verify that the Alice's certificate is not on
the CRL. Note that Bob is uninterested in all but one certificate on
the CRL. Nevertheless, he must download the entire CRL since,
otherwise, the VA's signature on the CRL cannot be verified. Since CRLs
and -CRLs tend to get long, they are downloaded infrequently,
e.g., once a week or month. As a result, certificate revocation
might only take effect a month after the revocation occurs. The
SEM architecture solves this problem altogether.
Suppose now that OCSP is usd for revocation. Whenever Bob sends email to
Alice he first issues an OCSP query to verify validity of Alice's
certificate. He then sends email encrypted with Alice's
public key. The encrypted email could sit on Alice's email server for a few
hours or days. If, during this time, Alice's key is revoked (e.g., because
Alice is fired or looses her private key) there is nothing preventing the
holder of Alice's private key from decrypting the email after
revocation. The SEM solves this problem by disabling the private
key immediately after revocation.
- Implicit timestamping: Both OCSP and CRLs require the signer to contact a trusted time service
at signature generation time to obtain a secure timestamp for the signature.
Otherwise, a verifier cannot determine with certainty when the signature was
issued. If binding semantics are sufficient, the time service is
unnecessary when using the SEM architecture. Once a certificate is revoked,
the corresponding private key can no longer be used to issue signatures.
Therefore, a verifier holding a signature is explicitly assured that
the signer's certificate was valid at the time the signature was generated.
- Shifted validation burden:
With current PKIs, the burden of validating certificates
is placed on: (1) senders of encrypted messages and (2) verifiers
of signed messages. In the SEM architecture, the burden of
certificate validation is reversed: (1) receivers of encrypted messages
and (2) signers (generators) of signed messages.
- SEM Replication (A disadvantage): Since many users need to
use the SEM for decryption and signing, it is natural to replicate it.
However, replicating the SEM across organizations is not recommended for
the same reason that replicating the VA in OCSP is not recommended.
Essentially, the SEM generates tokens using a private key known only
to the SEM. The result of exposing this key is that an attacker
could unrevoke certificates. Replicating the SEM might make it easier
to expose the SEM's key. Hence, the SEM architecture is mainly
applicable in the same environments where OCSP is used, i.e., mainly
medium-sized organizations. The SEM architecture is not geared towards
the global Internet.
Next: Conclusions
Up: Comparison of SEM with
Previous: Review of existing revocation
Gene Tsudik
2001-05-10