Public Key Infrastructure : Kerangka Validasi Yang Disempurnakan

Syahreza Mitzardie Yacub, Rikaro Ramadi, Dani Ernawati

Abstract


ABSTRACT

Public Key Infrastructure (PKI) is a comprehensive information security framework for providing secure information and communication over the internet. This research work examines the current PKI framework validation process operated by vendors and customers to identify weaknesses and propose an improved approach to its validation mechanism. Using the approach of reviewing secondary data, critical weaknesses of integrity, trust proof and single point of failure are identified with the current PKI framework. Therefore, this research advances the proposed solution to address the identified weaknesses by specifically introducing multiple Certificate Authorities, storage, visibility and searchability of customer information in a public repository. Comprehensive details of its implementation are proposed to address the identified weaknesses of uncertain integrity, trust for certificate authorities and preventing single point of failure. Furthermore, the proposed enhancements are validated with protection motivation theory and a framework for empirically testing the enhancements is suggested.

Keywords: Public Key Infrastructure, PKI Validation, Cyber Security

ABSTRAK

Publik Key Infrastructure (PKI) adalah kerangka kerja keamanan informasi yang komprehensif untuk menyediakan informasi dan komunikasi yang aman melalui internet. Karya penelitian ini mengkaji proses validasi kerangka kerja PKI saat ini yang dioperasikan oleh vendor dan pelanggan untuk mengidentifikasi kelemahan dan mengusulkan pendekatan yang ditingkatkan untuk mekanisme validasinya. Menggunakan pendekatan meninjau data sekunder, kelemahan kritis integritas, bukti kepercayaan dan satu titik kegagalan diidentifikasi dengan kerangka kerja PKI saat ini. Oleh karena itu, penelitian ini memajukan solusi yang diusulkan untuk mengatasi kelemahan yang teridentifikasi dengan secara khusus memperkenalkan beberapa Otoritas Sertifikat, penyimpanan, visibilitas, dan kemudahan pencarian informasi pelanggan di repositori publik. Detail yang komprehensif dari implementasinya diusulkan untuk mengatasi kelemahan yang teridentifikasi dari integritas yang tidak pasti, kepercayaan untuk otoritas sertifikat dan mencegah satu titik kegagalan. Selanjutnya, perangkat tambahan yang diusulkan divalidasi dengan teori motivasi perlindungan dan kerangka kerja untuk menguji perangkat tambahan secara empiris disarankan.

Kata Kunci: Infrastruktur Kunci Publik, Validasi PKI, Keamanan Siber


Keywords


Public Key Infrastructure, PKI Validation, Cyber Security

Full Text:

PDF

References


Lynch (2017) Hashed Out.

https://www.thesslstore.com/blog/wide-world-pki

Homeland Security, DISA Provides Public Key Infrastructure Security for the Mobile Environment.

https://www.hstoday.us/subject-matter-areas/infrastructure-security/disa-provides-public-key-infrastructure-security-for-the-mobile-environment

Ricks, M., Simakov, S. and Rabourn, S. (2014) Securing Public Key Infrastructure (PKI). Microsoft IT Information Security and Risk Management, 126.

Doowon, K., Kwon, B.J. and Dumitras, T. (2017) Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.

Soltani, S.Z. (2013) Improving PKI Solution Analysis in Case of CA Compromisation.

Höglund, J., Lindemer, S., Furuhed, M. and Raza, S. (2020) PKI4IoT: Towards Public Key Infrastructure for the Internet of Things. Computers & Security, 89, Article ID: 101658. https://doi.org/10.1016/j.cose.2019.101658

Dudovskiy, J. (2018) The Ultimate Guide to Writing a Dissertation in Business Studies: A Step-by-Step Assistance. Sage Publications, New York.

Adams, C. and Lloyd, S. (2003) Understanding Public-Key Infrastructure. Macmillan Technical Pub., Indianapolis.

Choudhury, S., Bhatnagar, K. and Haque, W. (2002) Public Key Infrastructure Implementation and Design. M&T Books, New York.

Rastegari, P., Susilo, W. and Dakhilalian, M. (2019) Certificateless Designated Verifier Signature Revisited: Achieving a Concrete Scheme in the Standard Model. International Journal of Information Security, 18, 619-635.

https://doi.org/10.1007/s10207-019-00430-5

Kubilay, M.Y., Kiraz, M.S. and Mantar, H.A. (2019) CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain. Computers and Security, 85, 333-352. https://doi.org/10.1016/j.cose.2019.05.013

Karatsiolis, E., Wiesmaier, A. and Buchmann, J. (2013) Introduction to Public Key Infrastructures. Springer-Verlag, New York.

Sinnott, R. (2011) Public Key Infrastructure.

https://www.researchgate.net/figure/A-public-key-infrastructure_fig1_220566584

Sheets, D. (2019) Trusted Computing.

https://www.militaryaerospace.com/trusted-computing/article/14035441/trusted-computing-algorithms-asymmetric

Kessler, G.C. (2019) An Overview of Cryptography.

https://www.garykessler.net/library/crypto.html#skc


Refbacks

  • There are currently no refbacks.
Powered by Puskom-UMJ