Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

Design a distributed PKI for web-backed

blockchain
Group - 09 Presentation

• Al kahaf (202011007)
• Ashish Gupta (202011013)
• Avichal Bansal (202011015)
• Hrishubh Bhandari (202011026)
• Sanskar Patel (202011054)

Mentor - Gaurav Pareek sir

Indian Institute of Information Technology Vadodara


International Campus Diu
Education Hub, Kevdi Diu(U.T) - 362520 IIITV-ICD
Outline

• PKI
• Decentralization and Problem Statement
• Implementation
• Limitations
• Crtitical analysis and future work.

CS-391 - Design Project November 12, 2022 2/13


[5]
How does PKI work?

Source: https://www.tutorialspoint.com/cryptography/public_key_infrastructure.htm

CS-391 - Design Project November 12, 2022 3/13


[2]
How Decentralization helps?

• With Decentralization, there would be no concentration of powers and no


single point of failure.

• Using blockchain technology, we can regularly update old certificates. This


helps in pruning old certificates as well as renewing other contracts regularly.

• As blockchain works on strict privacy-protecting measures, no one can


impersonate the person or organization owning any identity.

CS-391 - Design Project November 12, 2022 4/13


[2]
How Decentralization helps?

• With Decentralization, there would be no concentration of powers and no


single point of failure.

• Using blockchain technology, we can regularly update old certificates. This


helps in pruning old certificates as well as renewing other contracts regularly.

• As blockchain works on strict privacy-protecting measures, no one can


impersonate the person or organization owning any identity.

CS-391 - Design Project November 12, 2022 4/13


[2]
How Decentralization helps?

• With Decentralization, there would be no concentration of powers and no


single point of failure.

• Using blockchain technology, we can regularly update old certificates. This


helps in pruning old certificates as well as renewing other contracts regularly.

• As blockchain works on strict privacy-protecting measures, no one can


impersonate the person or organization owning any identity.

CS-391 - Design Project November 12, 2022 4/13


Problem Statement

To design a distributed public key infrastructure for


web-backed blockchain

CS-391 - Design Project November 12, 2022 5/13


Problems with existing blockchain technology for PKI.[4]

• There are a few existing decentralized solutions like Instant Karma PKI and
NameCoin BlockChain that have tried to resolve this issue.

• Still, they have certain limitations


• In NameCoin, once a certificate assigned to a name expires, that name
can not be used by another user.
• Instant Karma PKI has a limited set of CA’s, which makes it very difficult to
scale the system beyond a few thousand users.

CS-391 - Design Project November 12, 2022 6/13


Problems with existing blockchain technology for PKI.[4]

• There are a few existing decentralized solutions like Instant Karma PKI and
NameCoin BlockChain that have tried to resolve this issue.

• Still, they have certain limitations


• In NameCoin, once a certificate assigned to a name expires, that name
can not be used by another user.
• Instant Karma PKI has a limited set of CA’s, which makes it very difficult to
scale the system beyond a few thousand users.

CS-391 - Design Project November 12, 2022 6/13


Implementation of PKI on Blockchain

CS-391 - Design Project November 12, 2022 7/13


Demonstration

CS-391 - Design Project November 12, 2022 8/13


Limitations with the implementation.[1][2]

• The current system only enables one user to issue one certificate in their
name.

• The system in its current form is only compatible with RSA type key pairs.
• The contracts nonce would still be deducted even if the certificate is not
generated.

CS-391 - Design Project November 12, 2022 9/13


Limitations with the implementation.[1][2]

• The current system only enables one user to issue one certificate in their
name.

• The system in its current form is only compatible with RSA type key pairs.
• The contracts nonce would still be deducted even if the certificate is not
generated.

CS-391 - Design Project November 12, 2022 9/13


Limitations with the implementation.[1][2]

• The current system only enables one user to issue one certificate in their
name.

• The system in its current form is only compatible with RSA type key pairs.
• The contracts nonce would still be deducted even if the certificate is not
generated.

CS-391 - Design Project November 12, 2022 9/13


Security analysis.[3]

• 51% Attack
• A 51% attack is when a cryptocurrency miner or group of miners gains
control of more than 50% of a network’s blockchain.
• The 51% attack scenario is rare especially for more established
cryptocurrencies.

• Double spending attack.


• Double spending means the expenditure of the same digital currency
twice or more to avail the multiple services.
• This issue can also occur if there is an alteration in the network or copies
of the currency are only used and not the original one.

CS-391 - Design Project November 12, 2022 10/13


Security analysis.[3]

• 51% Attack
• A 51% attack is when a cryptocurrency miner or group of miners gains
control of more than 50% of a network’s blockchain.
• The 51% attack scenario is rare especially for more established
cryptocurrencies.

• Double spending attack.


• Double spending means the expenditure of the same digital currency
twice or more to avail the multiple services.
• This issue can also occur if there is an alteration in the network or copies
of the currency are only used and not the original one.

CS-391 - Design Project November 12, 2022 10/13


Future work

• The support for issuing multiple contracts to a single user


• Shift the PKI from the Proof of Work (POW) based blockchain to the Proof of
Stake based blockchain.

CS-391 - Design Project November 12, 2022 11/13


Future work

• The support for issuing multiple contracts to a single user


• Shift the PKI from the Proof of Work (POW) based blockchain to the Proof of
Stake based blockchain.

CS-391 - Design Project November 12, 2022 11/13


Bibliography

[1] Matsumoto, S. and Reischuk, R.M., 2017, May. IKP: turning a PKI around with
decentralized automated incentives. In 2017 IEEE Symposium on Security and
Privacy (SP) (pp. 410-426). IEEE.
[2] Cheng, J.C., Lee, N.Y., Chi, C. and Chen, Y.H., 2018, April. Blockchain and smart
contract for a digital certificate. In 2018 IEEE international conference on applied
system invention (ICASI) (pp. 1046-1051). IEEE.
[3] L. coronado garc ́ıa, “On the security and the eciency of the merkle signature
scheme,” IACR Cryptology ePrint Archive, vol. 2005, p. 192, 01 2005.
[4] http://www.diva-portal.org/smash/get/diva2:1121040/FULLTEXT01.pdf

[5] www.tutorialspoint.com/cryptography/public_key_infrastructure.htm

CS-391 - Design Project November 12, 2022 12/13


Thank You

CS-391 - Design Project November 12, 2022 13/13

You might also like