Lemmy.VG
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Natanael@infosec.pub to Cryptography @ Infosec.pub@infosec.pubEnglish · 1 month ago

Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice

eprint.iacr.org

external-link
message-square
0
fedilink
1
external-link

Clubcards for the WebPKI: smaller certificate revocation tests in theory and practice

eprint.iacr.org

Natanael@infosec.pub to Cryptography @ Infosec.pub@infosec.pubEnglish · 1 month ago
message-square
0
fedilink
CRLite is a low-bandwidth, low-latency, privacy-preserving mechanism for distributing certificate revocation data. A CRLite aggregator periodically encodes revocation data into a compact static hash set, or membership test, which can can be downloaded by clients and queried privately. We present a novel data-structure for membership tests, which we call a clubcard, and we evaluate the encoding efficiency of clubcards using data from Mozilla's CRLite infrastructure. As of November 2024, the WebPKI contains over 900 million valid certificates and over 8 million revoked certificates. We describe an instantiation of CRLite that encodes the revocation status of these certificates in a 6.7 MB package. This is $54\%$ smaller than the original instantiation of CRLite presented at the 2017 IEEE Symposium on Security and Privacy, and it is $21\%$ smaller than the lower bound claimed in that work. A sequence of clubcards can encode a dynamic dataset like the WebPKI revocation set. Using data from late 2024 again, we find that clubcards encoding 6 hour delta updates to the WebPKI can be compressed to 26.8 kB on average---a size that makes CRLite truly practical. We have extended Mozilla's CRLite infrastructure so that it can generate clubcards, and we have added client-side support for this system to Firefox. We report on some performance aspects of our implementation, which is currently the default revocation checking mechanism in Firefox Nightly, and we propose strategies for further reducing the bandwidth requirements of CRLite.

See also discussion here; https://reddit.com/comments/1jv572r

alert-triangle
You must log in or register to comment.

Cryptography @ Infosec.pub@infosec.pub

crypto@infosec.pub

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

Questions, answers, discussions, and literature on the theory and practice of cryptography

Rules (longer version here)

  • Stick to cryptography / infosec
  • Be a good netizen - be kind, act in good faith, maintain high quality, don’t mislead
  • Link directly to original sources
  • Don’t use us to cheat on challenges or tests!
  • Crypto review requests must show the algorithm
  • CTF / challenges and puzzles must use modern crypto
  • Avoid making duplicate posts
  • All use of AI / LLM and their prompts MUST be disclosed in your submissions and comments

##Related resources;

  • Reddit cryptography forums 1 & 2; /r/crypto /r/cryptography
  • Cryptology ePrint archive
  • Discussion site for ePrint papers
  • Libera Chat’s IRC:s #crypto - (IRC protocol URL)
  • Metzdowd cryptography mailing list
  • Randombit cryptography mailing list
  • StackExchange cryptography community
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 2 users / day
  • 2 users / week
  • 2 users / month
  • 10 users / 6 months
  • 0 local subscribers
  • 458 subscribers
  • 49 Posts
  • 0 Comments
  • Modlog
  • mods:
  • SqueamishOssifrage@infosec.pub
  • Trusted Third Party@infosec.pub
  • BE: 0.19.5
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org