Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight

07/19/2022
by   Hisham Galal, et al.
0

Public key infrastructure (PKI) is a certificate-based technology that helps in authenticating systems identities. HTTPS/TLS relies mainly on PKI to minimize fraud over the Internet. Nowadays, websites utilize CDNs to improve user experience, performance, and resilience against cyber attacks. However, combining HTTPS/TLS with CDNs has raised new security challenges. In any PKI system, keeping private keys private is of utmost importance. However, it has become the norm for CDN-powered websites to violate that fundamental assumption. Several solutions have been proposed to make HTTPS CDN-friendly. However, protection of private keys from the very instance of generation; and how they can be made secure against exposure by malicious (CDN) administrators and malware remain unexplored. We utilize trusted execution environments to protect private keys by never exposing them to human operators or untrusted software. We design Blindfold to protect private keys in HTTPS/TLS infrastructures, including CAs, website on-premise servers, and CDNs. We implemented a prototype to assess Blindfold's performance and performed several experiments on both the micro and macro levels. We found that Blindfold slightly outperforms SoftHSM in key generation by 1 certificate issuance operations.

READ FULL TEXT

page 22

page 23

page 24

research
08/08/2022

Simplifying Electronic Document Digital Signatures

Electronic documents are typically signed using private keys and the mat...
research
04/12/2022

Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

Public key authentication (PKA) has been deployed in various services to...
research
04/23/2018

BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets

Cryptocurrency wallets store the wallets private key(s), and hence, are ...
research
11/15/2020

Removable Weak Keys for Discrete Logarithm Based Cryptography

We describe a novel type of weak cryptographic private key that can exis...
research
09/19/2022

An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery

In this paper, we propose a very secure and reliable owner-self-managed ...
research
10/01/2021

Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges

Currently, one of the most widely used protocols to secure cryptocurrenc...
research
05/29/2018

Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption

We present new analytic techniques for inferring HTTP semantics from pas...

Please sign up or login with your details

Forgot password? Click here to reset