Effective and Practical Improvements to the Web Public-Key Infrastructure Stephanos Matsumoto 10.1184/R1/7808495.v1 https://kilthub.cmu.edu/articles/thesis/Effective_and_Practical_Improvements_to_the_Web_Public-Key_Infrastructure/7808495 The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for the purposes of encrypted communication. The security of the Web PKI primarily relies on certification authorities (CAs), trusted parties whose misbehavior can enable man-in-the-middle (MITM) attacks: the impersonation of websites to users, followed by the theft or modification of sensitive information. While many methods of addressing CA misbehavior have been proposed, no solution has been both effective and practical: able to protect websites users against C misbehavior and to be easily deployed and used by all parties involved. Thus, despite more than two decades of research advances, the Web PKI remains largely vulnerable to misbehaving CAs.<br>In this thesis, I argue that we can use minimal changes to existing technology to build deployable solutions that<br>reduce the rate of successful MITM attacks in the Web PKI. Specifically, I present three projects that exemplify<br>effective and practical approaches to improving the Web PKI. In IKP, I use the Ethereum cryptocurrency and smart<br>contract platform to build an insurance-like mechanism that disincentivizes CA misbehavior. In CAPS, I use two<br>global monitoring and logging systems, CT and Censys, to build a system that strengthens the existing PKI against<br>misbehaving CAs and enables the secure incremental deployment of new and improved PKIs for theWeb. In SAINT, I use the SCION future Internet architecture to propose a PKI that unifies public-key authentication for naming, routing, and end-entity public keys in a federated environment, and identify challenges and desired properties in such an environment. Through this work, I provide a first step towards making a more resilient Web PKI a reality. 2019-03-06 18:23:04 Authentication Cryptography Networking Security law