Abstract
In the past two or three years, most major Public Key Infrastructure(PKI) vendors have released products which allow users to roam from one machine to another without having to manually manage the export and import of their credentials such as private keys and corresponding certificates onto temporary media like diskettes. In this paper, we survey three popular key roaming products of Baltimore’s, Entrust’s and VeriSign’s. We also propose key roaming system which improves VeriSign’s roaming service and analyze its security.
Chapter PDF
Similar content being viewed by others
Keywords
- Secure Socket Layer
- User Registration
- National Information System Security
- Exhaustive Search Attack
- Secure Socket Layer Connection
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Baltimore: Baltimore Roaming. Private Communications (2001)
Bellovin S., Merrit M.: Encrypted key exchange: password based protocols secure against dictionary attacks. In Proceedings of the Symposium on Security and Privacy (1992) 72–84
Burton S., Kaliski JR.: Server-Assisted Regeneration of a Strong Secret From a Weak Secret. US Patent, US Patent Number 09/804,460 (2000)
Cohen F.: 50 Ways to Attack Your World Wide Web System. Computer Security Institute Annual Conference, Washington DC (1995)
Desmedt Y., Frankel Y.: Threshold cryptosystems. Advanced in Cryptology — Crypto’89, Springer-Verlag, LNCS 435 (1990) 307–315
Entrust: The Entrust Roaming Solution. Private Communications (2000)
Felton E., Balfanz D., Dean D., Wallach D.: Web Spoofing: An Internet Con Game. 20th National Information Systems Security Conference, Balimore Maryland (1997) available at http://www.cs.princeton.edu/sip/pub/spoofing.html
Ford W., Burton S., Kaliski JR.: Server-Assisted Generation of a Strong Secret from a Password. Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, NIST, Gaithersburg MD (2000)
Gennaro R., Jarecki S., Krawczyk H., Rabin T.: Secure distributed key generation for discrete-log cryptosystems. Advanced in Cryptology — Eurocrypt’99, Springer-Verlag, LNCS 1592 (1999) 295–310
Jablon D.: Strong password-only authenticated exchange. ACM Computer Communications Review, vol 26, No.5 (1996)
Oorschot P., Wiener M.J.: On Diffie-Hellman Key Agreement with Short Exponents. EUROCRYPT’96, Spriger-Verlag, LNCS 1070 (1996)
Pedersen T.P.: A threshold cryptosystem without a trusted party. Advanced in Cryptology — Eurocrypt’91, Springer-Verlag, LNCS 547 (1991) 522–526
Pedersen T.P.: Distributed provers with applications to undeniable signatures. Advanced in Cryptology — Eurocrypt’91, Springer-Verlag, LNCS 547 (1991) 221–238
VeriSign Inc.: Roaming Service Administrator’s Guide. (2002) available at http://www.verisign.com
VeriSign Inc.: Roaming Service. (2002) available at http://www.verisign.com/products/roaming/
Wiener M. J.: Secure Roaming with Software Tokens. PKI TWG Meeting (2000) available at http://csrc.nist.gov/pki/twg/y2000/presentations/twg-00-32.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, J., Kwon, H., Park, H., Kim, S., Won, D. (2003). An Improvement of VeriSign’s Key Roaming Service Protocol. In: Lovelle, J.M.C., Rodríguez, B.M.G., Gayo, J.E.L., del Puerto Paule Ruiz, M., Aguilar, L.J. (eds) Web Engineering. ICWE 2003. Lecture Notes in Computer Science, vol 2722. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45068-8_53
Download citation
DOI: https://doi.org/10.1007/3-540-45068-8_53
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40522-1
Online ISBN: 978-3-540-45068-9
eBook Packages: Springer Book Archive