Concordia University

https://www.concordia.ca/content/shared/en/news/encs/info-systems-eng/defences/2018/03/22/rethinking-certificate-authorities-understanding-decentralizing-domain-validation.html

notice

Master Thesis Defense - March 22, 2018: Rethinking Certificate Authorities: Understanding and Decentralizing Domain Validation

March 13, 2018

 

Seyedehmahsa Moosavi

Thursday, March 22, 2018 at 11:00 a.m.
Room EV012.163

You are invited to attend the following M.A.Sc. (Information Systems Security) thesis examination.

Examining Committee

Dr. W. Lucia, Chair
Dr. J. Clark, Supervisor
Dr. A. Youssef, CIISE Examiner
Dr. F. McKelvey, External Examiner (Com. Studies)

Abstract

HTTPS (HTTP over TLS) protocol provides message integrity, confidentiality, and server authentication. Server authentication relies on the client’s ability to obtain a correct public key which is bound to the server. To provide this, the Public Key Infrastructure (PKI) uses a system of trusted third parties (TTPs) called the certificate authorities (CAs). CAs are the companies who receive certificate requests for domain names, they then use validation techniques to verify the ownership of those domains and once verified, they issue the digital certificates. These digital certificates are the electronic documents which simply bind domain names to the cryptographic keys and can be further used to secure communication channels over the web. However, PKI’s several drawbacks enabled the malicious parties to break the entire CA model and issue themselves fraudulent certificates for domain names.

There has been little quantitative analysis of the certificate authorities (CAs) and how they establish domain names validation, so we first perform a thorough empirical study on the CA ecosystem and evaluate the security issues with the domain verification techniques. We find out that a central problem with the certificate model is that CAs resort to indirection to issue certificates because they are not directly authoritative over who owns what domain. Therefore, we design and implement a new and useful paradigm for thinking about who is actually authoritative over PKI information in the web certificate model. We then consider what smart contracts could add to the web certificate model, if we move beyond using a blockchain as passive, immutable (subject to consensus) store of data. To illustrate the potential, we develop and experiment with an Ethereum-based web certificate model we call Ghazal, discuss different design decisions, and analyze deployment costs.

 




Back to top

© Concordia University