Abstract

The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for the purposes of encrypted communication. The security of the Web PKI primarily relies on certification authorities (CAs), trusted parties whose misbehavior can enable man-in-the-middle (MITM) attacks: the impersonation of websites to users, followed by the theft or modification of sensitive information. While many methods of addressing CA misbehavior have been proposed, no solution has been both effective and practical: able to protect websites users against C misbehavior and to be easily deployed and used by all parties involved. Thus, despite more than two decades of research advances, the Web PKI remains largely vulnerable to misbehaving CAs.In this thesis, I argue that we can use minimal changes to existing technology to build deployable solutions thatreduce the rate of successful MITM attacks in the Web PKI. Specifically, I present three projects that exemplifyeffective and practical approaches to improving the Web PKI. In IKP, I use the Ethereum cryptocurrency and smartcontract platform to build an insurance-like mechanism that disincentivizes CA misbehavior. In CAPS, I use twoglobal monitoring and logging systems, CT and Censys, to build a system that strengthens the existing PKI againstmisbehaving CAs and enables the secure incremental deployment of new and improved PKIs for theWeb. In SAINT, I use the SCION future Internet architecture to propose a PKI that unifies public-key authentication for naming, routing, and end-entity public keys in a federated environment, and identify challenges and desired properties in such an environment. Through this work, I provide a first step towards making a more resilient Web PKI a reality.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call