
in Cryptography” in 1976 [2]. This infrastructure
was designed to enable secure, convenient, and
efficient discovery of public keys. This architecture
also provided additional functionality in the form of
digital certification which was designed to assure
that communication had taken place and had not
been altered in any way. There are various models of
PKIs each differing in information required, trust
rules, and flexibility. The X.509 model [3],
developed by the ITU Telecommunication
Standardization Sector (ITU-T), will be the main
focus of this paper. In order to fully understand the
context of PKIs, their uses, operations, components,
architectures, and responsibilities must first be
investigated.
3.1 Addressing Business Security
Needs
The primary applications of PKIs are electronic
commerce and electronic service delivery [4]. These
applications exist in the environments of business-
to-business (B2B), single business (B), business-to-
customer (B2C), and individual (I) [5]. PKIs address
all business requirements, as listed previously,
required from a security infrastructure in the
following manner [1].
3.2 Cryptographic Techniques Used
There are two forms of cryptography widely used on
the Internet, secret key “symmetric” and public key
“asymmetric”. SKC involves using a single key to
encrypt and decrypt data as opposed to public key
cryptography (PKC) which uses a pair of keys, one
public and one private. PKC is the more flexible of
the two forms since an entity only needs one key
pair to communicate with everybody as opposed to
SKC where an entity must have a unique key for
each other entity it wishes to communicate with.
X.509 PKIs utilise the best of both of the above
mentioned cryptographic forms. When used in PKIs,
PKC is used for digital signatures, for example if a
message is encrypted with an entity’s private key
any other entity can decrypt it with the
corresponding public key. Likewise, when used in
PKIs SKC is used for the encryption of messages,
for example if a message is encrypted with an
entity’s public key only the entity owning the
corresponding private key can decrypt it.
Furthermore, X.509 PKIs are capable of using two
authentication methods, simple authentication via
passwords and strong authentication via
cryptography techniques. It is strong authentication
this paper will focus on.
3.3 Responsibilities
Certificate authorities (CAs) are the main
component of PKIs. As such, they are responsible
for the services they provide as well as the quality of
the services they provide to entities. Entities expect
CAs to be reliable, have integrity and be liable for
any unauthorised misuse of any of their products.
However, legally CAs are not liable for the misuse
of their products and only have to adhere to two
criteria. These criteria involve proving an entity’s
public key has a working private key counterpart
and that an entity’s distinguishing name (DN) is
unique to that CA [11]. Functionally, however, CAs
need to handle additional management
responsibilities such as registration, initialisation,
certification, key pair recovery, key pair updates,
revocation requests, and cross-certification [9].
4 CERTIFICATE REVOCATION
Certificate revocation is a very important issue for
PKIs due to certificate’s secure nature and their use
for identifying entities. As a result certificate
revocation needs to be clearly defined, fast, efficient,
and timely. In general, if a CA wishes to revoke a
certificate it sends a revocation notice to a key server
which updates a CRL (Certificate Revocation List).
It is then the distribution of this revocation
information that has the potential to be the most
costly part of running a PKI [12]. Reasons for
revoking certificates can include: key compromise,
change of affiliation, superseded information,
cessation of operation, algorithm compromise,
revocation of superordinate certificate, lost or
defective security token, change of key usage, or
change of security policy [13].
4.1 Popular Methods
There have been many methods for certificate
revocation that have been proposed. The four most
popular methods are CRLs and Delta-CRLs, online
certificate status protocol (OCSP), the certificate
revocation system (CRS), and certificate revocation
trees (CRTs). These methods can be classified by
certain attributes such as their method of checking
(online/offline), the type of lists they use
(black/white), their way of providing evidence
(direct/indirect), and their way of distributing
information (push/pull mechanism) [13].
The most commonly used certificate revocation
method is that of the CRL which was introduced in
1988 by the ITU-T. The certificate revocation list is
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
94