Top Banner
© Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi and Arianna Curti Dipartimento di Scienze dell’Informazione Università degli Studi di Milano [email protected]
54

© Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

Mar 27, 2015

Download

Documents

Riley McKinnon
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 1

A Performance Evaluation Study of an X.509 Compliant

Public Key Infrastructure

Emilia RostiJoint work with Danilo Bruschi and Arianna

Curti

Dipartimento di Scienze dell’Informazione

Università degli Studi di Milano

[email protected]

Page 2: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 2

Outline

• PKI: what it is

• X.509: what it means

• Certificate revocation protocols

• Modeling a PKI

• Results

• Future work

Page 3: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 3

Public Key Infrastructure

• A system comprising policies, software and hardware components that realize a trusted third party that guarantees– authenticity,– ownership,– validity,

of “keys” and information related to them.– implements “organized” trust relationships

Page 4: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 4

PKI - Certificates

• End users generate public-private key pairs

• Certificate associated with public component of each key pair– information about owner, certifier entity,

certificate validity, algorithm used for signature, digital signature of the certifier entity

Page 5: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 5

PKI - Certificates

• Certificate authenticity– issued by PKI

• Certificate ownership– binding between certificate and

organization (person) indicated on it

• Certificate validity– not revoked

Page 6: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 6

PKI - Components• Registration Authority

– authenticates users, distributes keys and certificates, requests certificates

• Certification Authority– digitally signs, distributes, and revokes

certificates, issues lists of revoked certificates• trusted third party

• Directory – stores certificates for public access– X.500 directory with LDAP access protocol

Page 7: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 7

PKI – End users

• People and/or software applications– request ceritificate from CA or via RA,

access Directory to download lists of revoked certificates and certificates of other party

– may have SW or HW devices for signature/encryption (smart card)

Page 8: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 8

PKI - Functionalities

• Issueing certificates

• Distributing certificates

• Distributing certificate status information– certificate revocation lists (CRLs)

• Distributing policies adopted when issueing certificates

Page 9: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 9

Public Key Infrastructure

CA

Certification Authority

Registration Authority(optional)

enduser

Directory

certificatesand CRL

certificate and CRL retrieval

certificaterequests/

revocationscertificate and CRL distribution

certificate and CRL retrieval

certificate issueing

RA

Page 10: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 10

X.509

• Standard protocol for authentication services in X.500 Directory Service– part of X.500 Directory Recommendation– adopted by Visa, Mastercard, Netscape,

Entrust, TimeStep

Page 11: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 11

X.509v3

• Current standard– extension of X.509– more flexible structure

• from hierarchical structure with three levelsInternet Policy Registration Authority (root)

Policy Certification Authorities (level 2)

Certification Authorities (level 3

to flat structure with cross certification among CAs

– no need to traverse the tree up to IPRA

Page 12: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 12

X.509v3 certificate• (X.509) Information about

– version and serial number– subject (key owner)– issuer (CA that issued certificate)– validity (not before, not after)– subject public key info (key and algorithm

to be used with)– algorithm used for signing– signature of certificate

Page 13: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 13

X.509v3 certificate• v3 extensions

– authority key ID (if CA has multiple signature keys)

– subject key info (if subject has multiple keys)

– key usage restrictions– certificate policies– CA and subject attributes– certification constraints– CRL distribution points

Page 14: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 14

Certificate revocation

• Certificates may be revoked before their natural expiration date– private key compromised/lost– canceled account

• Certificate status information must be published for end user to be able to verify certificates they handle

Page 15: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 15

Certificate revocation• Certificate Revocation List

– serial numbers of revoked certificates– time of revocation– CA signature– CRL issuance time – next CRL issuance time

• Size– 51B + 9B*#revoked_certificates [MITRE 94]– entries deleted after certificate expiration

Page 16: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 16

Certificate revocation protocols

• Periodic publication of CRL– possibly outdated information

• overissued CRL• periodic publication of updates (delta-CRL)

• On demand status verification via OCSP (On-line Certificate Status Protocol)– timely status information

• Revocation policies performance analysis [Cooper1999, 2000]

Page 17: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 17

Modeling a PKI

• Who• CA, RA, Directory, end users

– does what• transaction identification• service demands

– and how• different policies for revocation information

management

Page 18: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 18

Modeling a PKI

• CA transactions– certificate issuance

• self-signed, RA-generated, renewal

– cross-certification– certificate revocation– CRL publication

Page 19: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 19

Modeling a PKI

• RA transactions– certificate issuance request– certificate revocation request

• Directory transactions– search, modify, add, delete

• End users transactions– certificate issuance/revocation request– certificate status verification

Page 20: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 20

Modeling a PKI - Transactions• Self-signed certificate requests

– user generates request and protects it with shared secret

– CA authenticates sender and shared secret, generates certificate, inserts it in local DB, signs reply and sends it to user

– user verifies CA signature, sends ack to CA– CA publishes certificate in Directory

Page 21: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 21

Modeling a PKI - Transactions• RA-generated certificate requests

– RA verifies user request, signs it and sends it to CA

– CA verifies RA signature, generates certificate, inserts it in local DB, signs and sends it to RA

– RA verifies CA signature, sends certificate to user, ack to CA

– CA publishes the certificate in Directory

Page 22: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 22

Modeling a PKI - Transactions• Self-signed revocation requests

– user generates revocation request, signs it and sends it to CA

– CA verifies user’s signature, adds serial number and revocation time to local DB, sends signed reply to user

– user verifies CA signature

Page 23: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 23

Modeling a PKI - Transactions• RA-generated revocation requests

– RA generates revocation request, signs it and sends it to CA

– CA verifies RA signature, adds serial number and revocation time to local DB, sends signed reply to RA

– RA verifies CA signature and informs user

Page 24: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 24

Modeling a PKI - Transactions• CRL generation

– CA reads revocation list, last full CRL and delta-CRL from local DB

– CA generates new delta-CRL and signs it– CA updates local DB– CA publishes delta-CRL in Directory

Page 25: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 25

Modeling a PKI - Methodology

• Queueing network model – hierarchical analysis

• components in isolation• complete model• enhancements

– analytic and simulation• exponentially distributed service times and customers

interarrival times

– single and multiclass customer population• different resource usage by various transactions

– closed and open models

Page 26: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 26

Modeling a PKI - Objectives

• Bottleneck analysis

• Impact of population mix on response time

• Maximum arrival rate for an acceptable response time

• What if analysis

Page 27: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 27

Modeling a PKI - Assumptions• 2048 RSA bit signature key for CA

– dedicated cryptographic coprocessor

• MD5 hash• Simple queries by CA to local certificate DB• Certificates for signature keys only• Delta-CRL• Off-line full CRL generation• Signed messages• Network communication services ignored

Page 28: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 28

Modeling a PKI - Assumptions

• Multiclass customer population– class 1: self-signed certificate request– class 2: self-signed revocation request– class 3: delta-CRL generation– class 4: RA-generated certificate request– class 5: RA-generated revocation request– class 6: cross-certification request

Page 29: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 29

RA RepCA

PKI complete model

Page 30: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 30

Basic models

• CA model in isolation

• RA model in isolation

CPU

DISK

CrytoCoP

Page 31: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 31

Basic models parameters• Number of users/certificates: 50,000

• Avg. number of revoked certificates: 20%

• Service demands estimation (ms)– time to sign 166 ms, to verify signature 4 ms

cl1 cl2 cl3 cl4 cl5 cl6CAmodCPU 0.215 0.049 3.584 0.182 0.051 0.199DISK 43.163 32.373 44.36 43.167 32.337 32.373CCP 340 170 166 336 170 336RAmodCPU 0.215 0.081DISK 32.835 21.144CCP 340 340

cl1: self-sig. req.cl2: self-sig. rev.cl3: delta-CRLcl4: RA-gen req.cl5: RA-gen rev.cl6: cross-cert.

Page 32: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 32

Basic model results• Signature is the bottleneck operation

• CA and RA can be modeled as load independent servers– service rates are throughputs obtained– service times in complete model (ms)

cl1 cl2 cl3 cl4 cl5 cl6CA 340 170 166 336 170 336RA 340 340

cl1: self-sig. req.cl2: self-sig. rev.cl3: delta-CRLcl4: RA-gen req.cl5: RA-gen rev.cl6: cross-cert.

Page 33: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 33

Complete model

• Only 5 classes– class 6 accounts for less than 0.02%

• Directory– certificate publication: 6ms– CRL publication: 12ms

RA DirCA

Page 34: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 34

Complete model assumptions

• Variable population mixes on classes 1, 2, 3, 4, 5– class 3 arrival rate is fixed

• generation of delta-CRL every 10 minutes 3 = 0.001667 req/s

– variable splits of total arrival rate among classes 1 = 1( - 3)

2 = 2( - 3)

4 = 4( - 3)

5 = 5( - 3)

1 + 2 + 4 + 5 = 1

Page 35: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 35

Model results

• Certificate requests rate larger than revocation requests rate– very unbalanced: total request fraction 82%

1 = 4 = 41%

2 = 5 = 9%

– less unbalanced: total request fraction 66%1 = 4 = 33%

2 = 5 = 17%

Page 36: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 36

66% newcertificaterequests

3 < max < 3.5

82% newcertificaterequests

3 < max < 3.5

0

2,5

5

7,5

10

12,5

15

17,5

20

22,5

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself_signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

0

2,5

5

7,5

10

12,5

15

17,5

20

22,5

25

0 0,5 1 1,5 2 2,5 3 3,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

More certificate requests

Page 37: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 37

Model results

• Only RA-generated certificate and revocation requests 4 = 82%

5 = 18%

• Only self-signed certificate and revocation requests 1 = 82%

2 = 18%

Page 38: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 38

Unique request source

RA-generatedonly requests2.5 < max < 3

self-signedonly

requests2.5 < max < 3.5

0

5

10

15

20

25

30

0 0,5 1 1,5 2 2,5 3 3,5

Arrival rate

Re

spo

nse

tim

e

s

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

0

5

10

15

20

25

30

0 0,5 1 1,5 2 2,5 3 3,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

Page 39: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 39

Model results

• Revocation requests rate larger than certificate requests rate– very unbalanced: tot. revocation fraction 82%

1 = 4 = 9%

2 = 5 = 41%

– less unbalanced: tot. revocation fraction 66%1 = 4 = 17%

2 = 5 = 33%

Page 40: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 40

More revocation requests

82% revocationrequests

4.5 < max < 5

66% revocationrequests

4 < max < 4.5

0

5

10

15

20

25

0 0,5 1 1,5 2 2,5 3 3,5 4 4,5 5 5,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

0

5

10

15

20

25

30

35

0 0,5 1 1,5 2 2,5 3 3,5 4 4,5 5

Arrival rate

Re

spo

nse

tim

e

sclasse1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

Page 41: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 41

Model results

• Balanced load 1 = 2 = 4 = 5 = 25%

– with - 3 such that response time is less than 5s, N 755,000

• Crev = 151,000

• SCRL = 1.3MB, average size of a full CRL

– SCRL = 51 + 9*Crev B

• TCRL = 0.568 s, time to generate a full CRL

– TCRL = Tdisk + Thash + Tsig

irrelevant since performed every 4 hours

Page 42: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 42

Balanced load

0

5

10

15

20

25

30

35

0 0,5 1 1,5 2 2,5 3 3,5 4 4,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

3.5 < max < 4

Page 43: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 43

Model results

• Balanced load 1 = 2 = 4 = 5 = 25%

max = 3.5 req/s, Resp-Time < 5s

• Limit frequency of full CRL publication without affecting performance– 5 minutes

• Limit frequency of delta-CRL publication without affecting performance– 1 minute

Page 44: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 44

Impact of full CRL generation

0

5

10

15

20

25

30

35

40

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Res

pons

e tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: delta-CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: full-CRL

0

10

20

30

40

50

60

70

80

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: delta-CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: full-CRL

6 = 0.00007once every

4 hours

variable 6

Page 45: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 45

Model results

• Signed log files– each operation performed by CA logged– CA signs each file entry– service times per class (s)

cl1 cl2 cl3 cl4 cl5

CA 2.498 1.332 1.162 2.162 1.332

cl1: self-sig. req.cl2: self-sig. rev.cl3: delta-CRLcl4: RA-gen req.cl5: RA-gen rev.

Page 46: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 46

Signed log file

• Unbalanced load 1 = 4 = 41%, 2 = 5 = 9%

max 0.4 req/s

1 = 4 = 17%, 2 = 5 = 33%max 0.66 req/s

• Balanced load 1 = 4 = 2 = 5 = 25%

max 0.5 req/s

Page 47: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 47

Plain vs signed log files

0

5

10

15

20

25

30

35

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

sat 0.5 vs 3.7 req/s

Page 48: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 48

Enhancements

• Directory requests according to [Cooper2000]– sliding window over-issued delta-CRL

• full CRL every 20 hours• delta-CRL every ten minutes, valid for 4 hours

– directory utilization increases max not affected

Page 49: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 49

Enhancements

• Revocations are signed and immediately published– users query the repository directly – no CRL

– 2.5 < max < 3 req/s with balanced and unbalanced load

Page 50: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 50

Over-issued CRL vs no CRL

0

5

10

15

20

25

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: accessial Repository

0

5

10

15

20

25

30

35

0 0,5 1 1,5 2 2,5 3 3,5

Arrival rate

Re

spo

nse

tim

e

s

classe1: richiesteself-signed

classe2: revocheself_signed

classe3: richiesteRA_generated

classe4: revocheRA-generated

Over-issued CRL w/ balanced load

revocationssigned

individuallybalanced load

Page 51: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 51

Enhancements

• Online Certificate Status Protocol– users query OCSP responder – only OCSP responder downloads CRL– OCSP signs replies to users max_OCSP 5.67 query/s

– 3.5 < max < 4 req/s with balanced load

Page 52: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 52

OCSP

0

5

10

15

20

25

30

35

40

0 0,5 1 1,5 2 2,5 3 3,5 4 4,5

Arrival rate

Res

pons

e tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: responderOCSP 1-11

0

5

10

15

20

25

30

35

40

45

0 0,5 1 1,5 2 2,5 3 3,5 4

Arrival rate

Res

pons

e tim

e

s

classe1: richiesteself-signed

classe2: revocheself-signed

classe3: delta-CRL

classe4: richiesteRA-generated

classe5: revocheRA-generated

classe6: richiesteall'OCSP

single OCSP

11 OCSP server

Page 53: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 53

Future work

• Compare results with software-only systems – no cryptographic coprocessor used

• Include communication time– bottleneck might switch

• Add Timestamp Authority

• Estimate total number of users for a given performance level

Page 54: © Rosti/DSI NPS - 02/22/01 1 A Performance Evaluation Study of an X.509 Compliant Public Key Infrastructure Emilia Rosti Joint work with Danilo Bruschi.

© Rosti/DSI NPS - 02/22/01 54

Bibliography

• Cooper1999: D.A. Cooper, A model of certificate revocation, 15th Annual Computer Security Application Conference, pp 256-264, 1999.

• Cooper2000: D.A. Cooper, A more efficient use of delta-CRL, 2000 IEEE Symposium of Security and Privacy, pp 190-202, 2000.