scispace - formally typeset
Proceedings ArticleDOI

Fast checking of individual certificate revocation on small systems

TLDR
It is shown that the use of keyed hash functions (message authentication codes) with a pre-registration option reduces network latency and allows stateless servers.
Abstract
High-security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable performance. This paper examines small system requirements and options, with a view to improving performance. It is shown that the use of keyed hash functions (message authentication codes) with a pre-registration option reduces network latency and allows stateless servers.

read more

Content maybe subject to copyright    Report

Citations
More filters
Patent

System and method for compressing secure E-mail for exchange with a mobile data communication device

TL;DR: In this paper, a system and method for preprocessing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device is provided, which can include post-processing messages sent from a WMC to a remote system.
Journal ArticleDOI

PKI: it's not dead, just resting

TL;DR: Despite an original design that failed to address the marketplace's needs, the use of innovative public key infrastructure models can make the technology meet today's requirements.
Patent

System and method for processing encoded messages for exchange with a mobile data communication device

TL;DR: In this article, a system and method for preprocessing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device is presented, which is used for post-processing messages.
Patent

System and method for secure message key caching in a mobile communication device

TL;DR: In this paper, a method and system for processing encrypted messages at a mobile device is described, where an encrypted message that comprises encrypted content as well as encryption information for accessing the encrypted content is obtained and stored to memory.
Patent

Certificate management and transfer system and method

TL;DR: In this paper, a method and system for certificate management and transfer between messaging clients are disclosed. But they do not discuss how to transfer certificates between the two clients, nor how to manage the certificates between them.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.

X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP

TL;DR: This document specifies a protocol useful in determining the current status of a digital certificate without requiring CRLs that is compatible with PKIX operational requirements.

The S/KEY One-Time Password System

N. Haller
TL;DR: This document describes the S/KEY* One-Time Password system as released for public use by Bellcore and as described in reference [3].
Book ChapterDOI

On Certificate Revocation and Validation

TL;DR: The traditional revocation techniques of Certificate Revocation Lists (CRLs) and on-line checking are described, as well as a newer technique, certificate Revocation Trees (CRTs), based on Merkle hash trees, which provide an efficient and highly-scalable way to distribute revocation information.