CCSP: A compressed certificate status protocol
Title | CCSP: A compressed certificate status protocol |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Chariton, A. A., Degkleri, E., Papadopoulos, P., Ilia, P., Markatos, E. P. |
Conference Name | IEEE INFOCOM 2017 - IEEE Conference on Computer Communications |
ISBN Number | 978-1-5090-5336-0 |
Keywords | Browsers, CAS, CCSP, certificate authorities, certificate revocation checks, Certificate Revocation Lists, certification, compressed certificate status protocol, computer network security, Conferences, Human Behavior, Internet, Metrics, OCSP servers, OCSP-based methods, Online Certificate Status Protocol servers, Protocols, pubcrawl, Public key, public key cryptography, Receivers, resilience, Resiliency, Scalability, signed certificates, sophisticated cyber-attackers, SSL Trust Models, timestamped certificates, Web browser, Web servers |
Abstract | Trust in SSL-based communications is provided by Certificate Authorities (CAs) in the form of signed certificates. Checking the validity of a certificate involves three steps: (i) checking its expiration date, (ii) verifying its signature, and (iii) ensuring that it is not revoked. Currently, such certificate revocation checks are done either via Certificate Revocation Lists (CRLs) or Online Certificate Status Protocol (OCSP) servers. Unfortunately, despite the existence of these revocation checks, sophisticated cyber-attackers, may trick web browsers to trust a revoked certificate, believing that it is still valid. Consequently, the web browser will communicate (over TLS) with web servers controlled by cyber-attackers. Although frequently updated, nonced, and timestamped certificates may reduce the frequency and impact of such cyber-attacks, they impose a very large overhead to the CAs and OCSP servers, which now need to timestamp and sign on a regular basis all the responses, for every certificate they have issued, resulting in a very high overhead. To mitigate this overhead and provide a solution to the described cyber-attacks, we present CCSP: a new approach to provide timely information regarding the status of certificates, which capitalizes on a newly introduced notion called signed collections. In this paper, we present the design, preliminary implementation, and evaluation of CCSP in general, and signed collections in particular. Our preliminary results suggest that CCSP (i) reduces space requirements by more than an order of magnitude, (ii) lowers the number of signatures required by 6 orders of magnitude compared to OCSP-based methods, and (iii) adds only a few milliseconds of overhead in the overall user latency. |
URL | https://ieeexplore.ieee.org/document/8057065 |
DOI | 10.1109/INFOCOM.2017.8057065 |
Citation Key | chariton_ccsp:_2017 |
- Online Certificate Status Protocol servers
- Web servers
- Web browser
- timestamped certificates
- SSL Trust Models
- sophisticated cyber-attackers
- signed certificates
- Scalability
- Resiliency
- resilience
- Receivers
- public key cryptography
- Public key
- pubcrawl
- Protocols
- Browsers
- OCSP-based methods
- OCSP servers
- Metrics
- internet
- Human behavior
- Conferences
- computer network security
- compressed certificate status protocol
- certification
- Certificate Revocation Lists
- certificate revocation checks
- certificate authorities
- CCSP
- CAS