期刊文献+

一种基于容忍入侵技术的CA方案 被引量:1

A Based Intrusion Tolerant CA Scheme
下载PDF
导出
摘要 CA是PKI中的关键设施.CA的可信任性依赖于CA的私钥。CA的私钥一旦泄露,该CA签发的所有证书就只能全部作废。确保CA的私钥不泄漏极其重要。容忍入侵技术不是通过传统的防火墙或入侵检测技术来保证CA的安全,而是确保当少数部件遭受入侵后,CA系统的机密信息并没有泄漏,即具有容忍入侵性。通过RSA加密算法和(t,n)秘密共享机制,将私钥分发给不同的共享服务器,并且私钥在任何时候都无需重构,保护了CA私钥的保密性,增强了CA的容忍入侵性. CA is the key infrastructure to the PKIo its reliability relies on its private key. Once its private key is revealed, all the certificates signed by the CA must be cancelled, so it is very important to ensure the CA private key is not revealed. Intrusion Toler- ant ensure the security of the CA by the way that even if some part of the CA is broken, the CA private key is still safe, instead of by the firewall and Intrusion detection, by RSA and (t,n) secret shared method, it distribute private key to different sharing servers. The private key needn't be reunion at any time to protect the security of the CA and enhance the Intrusion Tolerant of CA.
出处 《微计算机信息》 北大核心 2006年第12X期77-79,共3页 Control & Automation
基金 河南省科技攻关基金资助项目(编号:0524220044) 河南工业大学科研项目(0401009 050216)
关键词 容忍入侵 认证中心 秘密共享 Intrusion Tolerant,certificate authority,secret sharing
  • 相关文献

参考文献5

二级参考文献11

  • 1[1]Gemmell, P.S. An introduction to threshold cryptography. CryptoBytes, 1977,2(7):7~12.
  • 2[2]Wu, T., Malkin, M., Boneh, D. Building intrusion-tolerant applications. In: Proceedings of the USENIX Security Symposium. 1999. 79~91.
  • 3[3]Shoup, V. Practical threshold signatures. In: Proceedings of the Eurocrypt 2000. Bruges (Brugge): Springer-Verlag, 2000. 207~220.
  • 4[4]Frankel, Y., Gemmell, P., MacKenzie, P.D., et al. Optimal-Resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science. 1997. 384~393.
  • 5冯国登 裴定一.密码学导引[M].科学出版社,1999,4..
  • 6Amoroso E. G.. Intrusion Detection: An Introduction to Internet Surveillance,Correlation,Trace Back,Traps,and Response. Intrusion. Net Books, 1999
  • 7Northcutt S., Novak J.. Network Intrusion Detection: An Analysts' Handbook. New Riders, 2000
  • 8Du W., Mathur A.P.. Vulnerability testing of software system using fault injection. Department of Computer Science, Purdue University: Technical Report Coast TR-98-02, 1998
  • 9MCNC and D University. Sitar: A scalable intrusion tolerant architecture for distributed services. Technical Report, Research Proposal to DARPA BAA-00-15, 2000
  • 10Krsul I., Spafford E. H., Tripunitara M. V.. Computer vulnerability analysis. Department of Computer Science, Purdue University, Technical Report Coast TR 98-07, 1998

共引文献101

同被引文献5

  • 1Nancy R.Mead, Robert Ellison. Life-Cycle Models for Survivable Systems[J].Proceedings of 3th Information Survivability Workshop,2000.
  • 2Robert J.Ellison,N.R. Mead. Survivable Network Systems: An Emerging Discipline[R].Technical Report CMU/SEI-97-TR-013, Carnegie Mellon University,May 1999.
  • 3Liu Peng. Architectures for Intrusion Tolerant Database Systems[J]. Foundations of Intrusion Tolerant Systems(OASIS'03),2003.
  • 4黄遵国.面向生荐能力的应急响应与事故恢复技术[D].国防科技大学,2004.
  • 5成焕卿,王朝君.一种基于服务漂移的网络安全应急响应机制研究与实现[J].中国计算机学会2004信息保密专业委员会学术年会,2004:25-31.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部