In recent years certification authorities (CAs) have been the target of multiple attacks due to their sensitive role in internet security. In fact, with access to malicious certificates it is possible to mount effective large-scale man-in-the-middle attacks that may become very vicious, especially if the incident is not properly handled. Many attacks, such as the 2011 ones against DigiNotar and Comodo, also show strong hints of state sponsorship; thus, CAs have to be considered primary targets in a scenario of (possibly state-sponsored) large-scale cyber attacks. Therefore, there is a need for a PKI protocol which is more resilient and without single points of failure, such as the CAs. The BIX protocol is a blockchain-based protocol that allows distribution of certificates linking a subject with their public key, hence providing a service similar to that of a PKI but without the need for a CA. In this paper, we analyse the security of the BIX protocol in a formal way. First, we identify formal security assumptions which are well-suited to this protocol. Second, we present some attack scenarios against the BIX protocol. Third, we provide formal security proofs that these attacks are not feasible under our previously established assumptions.

On the Security of the Blockchain BIX Protocol and Certificates / Longo, Riccardo; Pintore, Federico; Rinaldo, Giancarlo; Sala, Massimiliano. - STAMPA. - (2017), pp. 217-232. ((Intervento presentato al convegno 2017 9th International Conference on Cyber Conflict: Defending the Core tenutosi a Tallin, Estonia nel 30 maggio-02 Giugno 2017.

On the Security of the Blockchain BIX Protocol and Certificates

Longo, Riccardo;Pintore, Federico;Rinaldo, Giancarlo;Sala, Massimiliano
2017

Abstract

In recent years certification authorities (CAs) have been the target of multiple attacks due to their sensitive role in internet security. In fact, with access to malicious certificates it is possible to mount effective large-scale man-in-the-middle attacks that may become very vicious, especially if the incident is not properly handled. Many attacks, such as the 2011 ones against DigiNotar and Comodo, also show strong hints of state sponsorship; thus, CAs have to be considered primary targets in a scenario of (possibly state-sponsored) large-scale cyber attacks. Therefore, there is a need for a PKI protocol which is more resilient and without single points of failure, such as the CAs. The BIX protocol is a blockchain-based protocol that allows distribution of certificates linking a subject with their public key, hence providing a service similar to that of a PKI but without the need for a CA. In this paper, we analyse the security of the BIX protocol in a formal way. First, we identify formal security assumptions which are well-suited to this protocol. Second, we present some attack scenarios against the BIX protocol. Third, we provide formal security proofs that these attacks are not feasible under our previously established assumptions.
2017 IEEE International Conference on Cyber Conflict: Defending the Core
Tallin, Estonia
NATO CCD COE Publications
978-9949-9904-0-5
978-9949-9904-1-2
Longo, Riccardo; Pintore, Federico; Rinaldo, Giancarlo; Sala, Massimiliano
On the Security of the Blockchain BIX Protocol and Certificates / Longo, Riccardo; Pintore, Federico; Rinaldo, Giancarlo; Sala, Massimiliano. - STAMPA. - (2017), pp. 217-232. ((Intervento presentato al convegno 2017 9th International Conference on Cyber Conflict: Defending the Core tenutosi a Tallin, Estonia nel 30 maggio-02 Giugno 2017.
File in questo prodotto:
File Dimensione Formato  
Bix.pdf

Solo gestori archivio

Descrizione: Articolo
Tipologia: Versione editoriale (Publisher’s layout)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 618.38 kB
Formato Adobe PDF
618.38 kB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11572/181713
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? 0
social impact