TY - JOUR
T1 - A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies
AU - Khan, Salabat
AU - Luo, Fei
AU - Zhang, Zijian
AU - Ullah, Farhan
AU - Amin, Farhan
AU - Qadri, Syed Furqan
AU - Heyat, Md Belal Bin
AU - Ruby, Rukhsana
AU - Wang, Lu
AU - Ullah, Shamsher
AU - Li, Meng
AU - Leung, Victor C.M.
AU - Wu, Kaishun
N1 - Publisher Copyright:
© ; 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Cyber-attacks are becoming more common against Internet users due to the increasing dependency on online communication in their daily lives. X.509 Public-Key Infrastructure (PKIX) is the most widely adopted and used system to secure online communications and digital identities. However, different attack vectors exist against the PKIX system, which attackers exploit to breach the security of the reliant protocols. Recently, various projects (e.g., Let's Encrypt and Google Certificate Transparency) have been started to encrypt online communications, fix PKIX vulnerabilities, and guard Internet users against cyber-attacks. This survey focuses on classical PKIX proposals, certificate revocation proposals, and their implementation on blockchain as well as ledger technologies. First, we discuss the PKIX architecture, the history of the World Wide Web, the certificate issuance process, and possible attacks on the certificate issuance process. Second, a taxonomy of PKIX proposals, revocation proposals, and their modern implementation is provided. Then, a set of evaluation metrics is defined for comparison. Finally, the leading proposals are compared using 15 evaluation metrics and 13 cyber-attacks before presenting the lessons learned and suggesting future PKIX and revocation research.
AB - Cyber-attacks are becoming more common against Internet users due to the increasing dependency on online communication in their daily lives. X.509 Public-Key Infrastructure (PKIX) is the most widely adopted and used system to secure online communications and digital identities. However, different attack vectors exist against the PKIX system, which attackers exploit to breach the security of the reliant protocols. Recently, various projects (e.g., Let's Encrypt and Google Certificate Transparency) have been started to encrypt online communications, fix PKIX vulnerabilities, and guard Internet users against cyber-attacks. This survey focuses on classical PKIX proposals, certificate revocation proposals, and their implementation on blockchain as well as ledger technologies. First, we discuss the PKIX architecture, the history of the World Wide Web, the certificate issuance process, and possible attacks on the certificate issuance process. Second, a taxonomy of PKIX proposals, revocation proposals, and their modern implementation is provided. Then, a set of evaluation metrics is defined for comparison. Finally, the leading proposals are compared using 15 evaluation metrics and 13 cyber-attacks before presenting the lessons learned and suggesting future PKIX and revocation research.
KW - Blockchain
KW - ledger technology
KW - privacy
KW - public-key infrastructure (PKI)
KW - revocation
UR - http://www.scopus.com/inward/record.url?scp=85174799254&partnerID=8YFLogxK
U2 - 10.1109/COMST.2023.3323640
DO - 10.1109/COMST.2023.3323640
M3 - Article
AN - SCOPUS:85174799254
SN - 1553-877X
VL - 25
SP - 2529
EP - 2568
JO - IEEE Communications Surveys and Tutorials
JF - IEEE Communications Surveys and Tutorials
IS - 4
ER -