+ All Categories
Home > Documents > A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

Date post: 14-Jan-2016
Category:
Upload: aoife
View: 32 times
Download: 0 times
Share this document with a friend
Description:
A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure. Emilia Rosti Joint work with Danilo Bruschi and Arianna Curti Dipartimento di Scienze dell’Informazione Università degli Studi di Milano [email protected]. Outline. PKI: what it is X.509: what it means - PowerPoint PPT Presentation
Popular Tags:
54
© Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi and Arianna Curti Dipartimento di Scienze dell’Informazione Università degli Studi di Milano [email protected]
Transcript
Page 1: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 1

A Performance Evaluation Study of an X.509 Compliant

Public Key Infrastructure

Emilia RostiJoint work with Danilo Bruschi and Arianna

Curti

Dipartimento di Scienze dell’Informazione

Università degli Studi di Milano

[email protected]

Page 2: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 2

Outline

• PKI: what it is

• X.509: what it means

• Certificate revocation protocols

• Modeling a PKI

• Results

• Future work

Page 3: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 3

Public Key Infrastructure

• A system comprising policies, software and hardware components that realize a trusted third party that guarantees– authenticity,– ownership,– validity,

of “keys” and information related to them.– implements “organized” trust relationships

Page 4: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 4

PKI - Certificates

• End users generate public-private key pairs

• Certificate associated with public component of each key pair– information about owner, certifier entity,

certificate validity, algorithm used for signature, digital signature of the certifier entity

Page 5: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 5

PKI - Certificates

• Certificate authenticity– issued by PKI

• Certificate ownership– binding between certificate and

organization (person) indicated on it

• Certificate validity– not revoked

Page 6: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 6

PKI - Components• Registration Authority

– authenticates users, distributes keys and certificates, requests certificates

• Certification Authority– digitally signs, distributes, and revokes

certificates, issues lists of revoked certificates• trusted third party

• Directory – stores certificates for public access– X.500 directory with LDAP access protocol

Page 7: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 7

PKI – End users

• People and/or software applications– request ceritificate from CA or via RA,

access Directory to download lists of revoked certificates and certificates of other party

– may have SW or HW devices for signature/encryption (smart card)

Page 8: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 8

PKI - Functionalities

• Issueing certificates

• Distributing certificates

• Distributing certificate status information– certificate revocation lists (CRLs)

• Distributing policies adopted when issueing certificates

Page 9: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 9

Public Key Infrastructure

CA

Certification Authority

Registration Authority(optional)

enduser

Directory

certificatesand CRL

certificate and CRL retrieval

certificaterequests/

revocationscertificate and CRL distribution

certificate and CRL retrieval

certificate issueing

RA

Page 10: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 10

X.509

• Standard protocol for authentication services in X.500 Directory Service– part of X.500 Directory Recommendation– adopted by Visa, Mastercard, Netscape,

Entrust, TimeStep

Page 11: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 11

X.509v3

• Current standard– extension of X.509– more flexible structure

• from hierarchical structure with three levelsInternet Policy Registration Authority (root)

Policy Certification Authorities (level 2)

Certification Authorities (level 3

to flat structure with cross certification among CAs

– no need to traverse the tree up to IPRA

Page 12: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 12

X.509v3 certificate• (X.509) Information about

– version and serial number– subject (key owner)– issuer (CA that issued certificate)– validity (not before, not after)– subject public key info (key and algorithm

to be used with)– algorithm used for signing– signature of certificate

Page 13: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 13

X.509v3 certificate• v3 extensions

– authority key ID (if CA has multiple signature keys)

– subject key info (if subject has multiple keys)

– key usage restrictions– certificate policies– CA and subject attributes– certification constraints– CRL distribution points

Page 14: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 14

Certificate revocation

• Certificates may be revoked before their natural expiration date– private key compromised/lost– canceled account

• Certificate status information must be published for end user to be able to verify certificates they handle

Page 15: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 15

Certificate revocation• Certificate Revocation List

– serial numbers of revoked certificates– time of revocation– CA signature– CRL issuance time – next CRL issuance time

• Size– 51B + 9B*#revoked_certificates [MITRE 94]– entries deleted after certificate expiration

Page 16: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 16

Certificate revocation protocols

• Periodic publication of CRL– possibly outdated information

• overissued CRL• periodic publication of updates (delta-CRL)

• On demand status verification via OCSP (On-line Certificate Status Protocol)– timely status information

• Revocation policies performance analysis [Cooper1999, 2000]

Page 17: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 17

Modeling a PKI

• Who• CA, RA, Directory, end users

– does what• transaction identification• service demands

– and how• different policies for revocation information

management

Page 18: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 18

Modeling a PKI

• CA transactions– certificate issuance

• self-signed, RA-generated, renewal

– cross-certification– certificate revocation– CRL publication

Page 19: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 19

Modeling a PKI

• RA transactions– certificate issuance request– certificate revocation request

• Directory transactions– search, modify, add, delete

• End users transactions– certificate issuance/revocation request– certificate status verification

Page 20: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 20

Modeling a PKI - Transactions• Self-signed certificate requests

– user generates request and protects it with shared secret

– CA authenticates sender and shared secret, generates certificate, inserts it in local DB, signs reply and sends it to user

– user verifies CA signature, sends ack to CA– CA publishes certificate in Directory

Page 21: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 21

Modeling a PKI - Transactions• RA-generated certificate requests

– RA verifies user request, signs it and sends it to CA

– CA verifies RA signature, generates certificate, inserts it in local DB, signs and sends it to RA

– RA verifies CA signature, sends certificate to user, ack to CA

– CA publishes the certificate in Directory

Page 22: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 22

Modeling a PKI - Transactions• Self-signed revocation requests

– user generates revocation request, signs it and sends it to CA

– CA verifies user’s signature, adds serial number and revocation time to local DB, sends signed reply to user

– user verifies CA signature

Page 23: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 23

Modeling a PKI - Transactions• RA-generated revocation requests

– RA generates revocation request, signs it and sends it to CA

– CA verifies RA signature, adds serial number and revocation time to local DB, sends signed reply to RA

– RA verifies CA signature and informs user

Page 24: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 24

Modeling a PKI - Transactions• CRL generation

– CA reads revocation list, last full CRL and delta-CRL from local DB

– CA generates new delta-CRL and signs it– CA updates local DB– CA publishes delta-CRL in Directory

Page 25: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 25

Modeling a PKI - Methodology

• Queueing network model – hierarchical analysis

• components in isolation• complete model• enhancements

– analytic and simulation• exponentially distributed service times and customers

interarrival times

– single and multiclass customer population• different resource usage by various transactions

– closed and open models

Page 26: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 26

Modeling a PKI - Objectives

• Bottleneck analysis

• Impact of population mix on response time

• Maximum arrival rate for an acceptable response time

• What if analysis

Page 27: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 27

Modeling a PKI - Assumptions• 2048 RSA bit signature key for CA

– dedicated cryptographic coprocessor

• MD5 hash• Simple queries by CA to local certificate DB• Certificates for signature keys only• Delta-CRL• Off-line full CRL generation• Signed messages• Network communication services ignored

Page 28: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 28

Modeling a PKI - Assumptions

• Multiclass customer population– class 1: self-signed certificate request– class 2: self-signed revocation request– class 3: delta-CRL generation– class 4: RA-generated certificate request– class 5: RA-generated revocation request– class 6: cross-certification request

Page 29: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 29

RA RepCA

PKI complete model

Page 30: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 30

Basic models

• CA model in isolation

• RA model in isolation

CPU

DISK

CrytoCoP

Page 31: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 31

Basic models parameters• Number of users/certificates: 50,000

• Avg. number of revoked certificates: 20%

• Service demands estimation (ms)– time to sign 166 ms, to verify signature 4 ms

cl1 cl2 cl3 cl4 cl5 cl6CAmodCPU 0.215 0.049 3.584 0.182 0.051 0.199DISK 43.163 32.373 44.36 43.167 32.337 32.373CCP 340 170 166 336 170 336RAmodCPU 0.215 0.081DISK 32.835 21.144CCP 340 340

cl1: self-sig. req.cl2: self-sig. rev.cl3: delta-CRLcl4: RA-gen req.cl5: RA-gen rev.cl6: cross-cert.

Page 32: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 32

Basic model results• Signature is the bottleneck operation

• CA and RA can be modeled as load independent servers– service rates are throughputs obtained– service times in complete model (ms)

cl1 cl2 cl3 cl4 cl5 cl6CA 340 170 166 336 170 336RA 340 340

cl1: self-sig. req.cl2: self-sig. rev.cl3: delta-CRLcl4: RA-gen req.cl5: RA-gen rev.cl6: cross-cert.

Page 33: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 33

Complete model

• Only 5 classes– class 6 accounts for less than 0.02%

• Directory– certificate publication: 6ms– CRL publication: 12ms

RA DirCA

Page 34: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 34

Complete model assumptions

• Variable population mixes on classes 1, 2, 3, 4, 5– class 3 arrival rate is fixed

• generation of delta-CRL every 10 minutes 3 = 0.001667 req/s

– variable splits of total arrival rate among classes 1 = 1( - 3)

2 = 2( - 3)

4 = 4( - 3)

5 = 5( - 3)

1 + 2 + 4 + 5 = 1

Page 35: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 35

Model results

• Certificate requests rate larger than revocation requests rate– very unbalanced: total request fraction 82%

1 = 4 = 41%

2 = 5 = 9%

– less unbalanced: total request fraction 66%1 = 4 = 33%

2 = 5 = 17%

Page 36: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 36

66% newcertificaterequests

3 < max < 3.5

82% newcertificaterequests

3 < max < 3.5

0

2,5

5

7,5

10

12,5

15

17,5

20

22,5

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself_signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

0

2,5

5

7,5

10

12,5

15

17,5

20

22,5

25

0 0,5 1 1,5 2 2,5 3 3,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

More certificate requests

Page 37: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 37

Model results

• Only RA-generated certificate and revocation requests 4 = 82%

5 = 18%

• Only self-signed certificate and revocation requests 1 = 82%

2 = 18%

Page 38: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 38

Unique request source

RA-generatedonly requests2.5 < max < 3

self-signedonly

requests2.5 < max < 3.5

0

5

10

15

20

25

30

0 0,5 1 1,5 2 2,5 3 3,5

Arrival rate

Re

spo

nse

tim

e

s

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

0

5

10

15

20

25

30

0 0,5 1 1,5 2 2,5 3 3,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

Page 39: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 39

Model results

• Revocation requests rate larger than certificate requests rate– very unbalanced: tot. revocation fraction 82%

1 = 4 = 9%

2 = 5 = 41%

– less unbalanced: tot. revocation fraction 66%1 = 4 = 17%

2 = 5 = 33%

Page 40: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 40

More revocation requests

82% revocationrequests

4.5 < max < 5

66% revocationrequests

4 < max < 4.5

0

5

10

15

20

25

0 0,5 1 1,5 2 2,5 3 3,5 4 4,5 5 5,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

0

5

10

15

20

25

30

35

0 0,5 1 1,5 2 2,5 3 3,5 4 4,5 5

Arrival rate

Re

spo

nse

tim

e

sclasse1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

Page 41: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 41

Model results

• Balanced load 1 = 2 = 4 = 5 = 25%

– with - 3 such that response time is less than 5s, N 755,000

• Crev = 151,000

• SCRL = 1.3MB, average size of a full CRL

– SCRL = 51 + 9*Crev B

• TCRL = 0.568 s, time to generate a full CRL

– TCRL = Tdisk + Thash + Tsig

irrelevant since performed every 4 hours

Page 42: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 42

Balanced load

0

5

10

15

20

25

30

35

0 0,5 1 1,5 2 2,5 3 3,5 4 4,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

3.5 < max < 4

Page 43: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 43

Model results

• Balanced load 1 = 2 = 4 = 5 = 25%

max = 3.5 req/s, Resp-Time < 5s

• Limit frequency of full CRL publication without affecting performance– 5 minutes

• Limit frequency of delta-CRL publication without affecting performance– 1 minute

Page 44: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 44

Impact of full CRL generation

0

5

10

15

20

25

30

35

40

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Res

pons

e tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: delta-CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: full-CRL

0

10

20

30

40

50

60

70

80

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: delta-CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: full-CRL

6 = 0.00007once every

4 hours

variable 6

Page 45: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 45

Model results

• Signed log files– each operation performed by CA logged– CA signs each file entry– service times per class (s)

cl1 cl2 cl3 cl4 cl5

CA 2.498 1.332 1.162 2.162 1.332

cl1: self-sig. req.cl2: self-sig. rev.cl3: delta-CRLcl4: RA-gen req.cl5: RA-gen rev.

Page 46: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 46

Signed log file

• Unbalanced load 1 = 4 = 41%, 2 = 5 = 9%

max 0.4 req/s

1 = 4 = 17%, 2 = 5 = 33%max 0.66 req/s

• Balanced load 1 = 4 = 2 = 5 = 25%

max 0.5 req/s

Page 47: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 47

Plain vs signed log files

0

5

10

15

20

25

30

35

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

sat 0.5 vs 3.7 req/s

Page 48: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 48

Enhancements

• Directory requests according to [Cooper2000]– sliding window over-issued delta-CRL

• full CRL every 20 hours• delta-CRL every ten minutes, valid for 4 hours

– directory utilization increases max not affected

Page 49: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 49

Enhancements

• Revocations are signed and immediately published– users query the repository directly – no CRL

– 2.5 < max < 3 req/s with balanced and unbalanced load

Page 50: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 50

Over-issued CRL vs no CRL

0

5

10

15

20

25

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: accessial Repository

0

5

10

15

20

25

30

35

0 0,5 1 1,5 2 2,5 3 3,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself_signed

classe3: richiesteRA_generated

classe4: revocheRA-generated

Over-issued CRL w/ balanced load

revocationssigned

individuallybalanced load

Page 51: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 51

Enhancements

• Online Certificate Status Protocol– users query OCSP responder – only OCSP responder downloads CRL– OCSP signs replies to users max_OCSP 5.67 query/s

– 3.5 < max < 4 req/s with balanced load

Page 52: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 52

OCSP

0

5

10

15

20

25

30

35

40

0 0,5 1 1,5 2 2,5 3 3,5 4 4,5

Arrival rate

Res

pons

e tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: responderOCSP 1-11

0

5

10

15

20

25

30

35

40

45

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Res

pons

e tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: delta-CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: richiesteall'OCSP

single OCSP

11 OCSP server

Page 53: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 53

Future work

• Compare results with software-only systems – no cryptographic coprocessor used

• Include communication time– bottleneck might switch

• Add Timestamp Authority

• Estimate total number of users for a given performance level

Page 54: A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure

© Rosti/DSI NPS - 02/22/01 54

Bibliography

• Cooper1999: D.A. Cooper, A model of certificate revocation, 15th Annual Computer Security Application Conference, pp 256-264, 1999.

• Cooper2000: D.A. Cooper, A more efficient use of delta-CRL, 2000 IEEE Symposium of Security and Privacy, pp 190-202, 2000.


Recommended