This Article 
 Bibliographic References 
 Add to: 
Resilient Authentication Using Path Independence
December 1998 (vol. 47 no. 12)
pp. 1351-1362

Abstract—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distributed system. In this paper, we explore the use of multiple paths to redundantly authenticate a channel and focus on two notions of path independence—disjoint paths and connective paths—that seem to increase assurance in the authentication. We give evidence that there are no efficient algorithms for locating maximum sets of paths with these independence properties and propose several approximation algorithms for these problems. We also describe a service we have deployed, called PathServer, that makes use of our algorithms to find such sets of paths to support authentication in PGP applications.

[1] T. Beth, M. Borcherding, and B. Klein, "Valuation of Trust in Open Networks," Proc. Computer Security—ESORICS '94, D. Gollman, ed., pp. 3-18, 1994.
[2] A.D. Birrell, B.W. Lampson, R.M. Needham, and M.D. Schroeder, "A Global Authentication Service without Global Trust," Proc. 1986 IEEE Symp. Security and Privacy, pp. 223-230, Apr. 1986.
[3] International Telegraph and Telephone Consultative Committee (CCITT), The Directory—Authentication Framework, Recommendation X.509, 1988.
[4] E.W. Dijkstra, "A Note on Two Problems in Connexion with Graphs," Numerische Mathematik, vol. 1, pp. 269-271, 1959.
[5] R.C. Entringer, D.E. Jackson, and P.J. Slater, "Geodetic Connectivity of Graphs," IEEE Trans. Circuits and Systems, vol. 24, no. 8, pp. 460-463, Aug. 1977.
[6] M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness.New York: W.H. Freeman, 1979.
[7] M.R. Garey, D.S. Johnson, and L. Stockmeyer, "Some Simplified NP-Complete Graph Problems," Theoretical Computer Science, vol. 1, pp. 237-267, 1976.
[8] V.D. Gligor, S. Luan, and J.N. Pato, "On Inter-Realm Authentication in Large Distributed Systems," Proc. 1992 IEEE Symp. Research in Security and Privacy, pp. 2-17, May 1992.
[9] A. Itai, Y. Perl, and Y. Shiloach, "The Complexity of Finding Maximum Disjoint Paths with Length Constraints," Networks, vol. 12, pp. 277-286, 1982.
[10] D.S. Johnson, "Worst Case Behavior of Graph Coloring Algorithms," Proc. Fifth Southeastern Conf. Combinatorics, Graph Theory, and Computing, pp. 513-527, Feb. 1974.
[11] S. Kent, "Internet Privacy Enhanced Mail," Comm. ACM, vol. 36, no. 8, pp. 48-60, Aug. 1993.
[12] V. King, S. Rao, and R. Tarjan, "A Faster Deterministic Maximum Flow Algorithm," Proc. Third ACM Symp. Discrete Algorithms, pp. 157-164, 1992.
[13] B. Lampson et al., "Authentication in Distributed Systems: Theory and Practice," ACM Trans. Computer Systems, Nov. 1992, pp. 265-310.
[14] R. Levien and A. Aiken, "Attack-Resistant Trust Metrics for Public Key Certification," Seventh USENIX Security Symp. Proc, pp. 229-242, Jan. 1998.
[15] L. Lovász, V. Neumann-Lara, and M. Plummer, "Mengerian Theorems for Paths of Bounded Length," Periodica Mathematica Hungarica, vol. 9, no. 4, pp. 269-276, 1978.
[16] U. Maurer, "Modelling a Public-Key Infrastructure," Computer Security—ESORICS '96, E. Bertino, H. Kurth, G. Martella, and E. Montolivo, eds., 1996.
[17] N. McBurnett, "PGP Web of Trust Statistics," ~nealpgpstat/, 1996.
[18] M.K. Reiter and S.G. Stubblebine, "Path Independence for Authentication in Large-Scale Systems," Proc. Fourth ACM Conf. Computer and Comm. Security, pp. 57-66, Apr. 1997.
[19] M.K. Reiter and S.G. Stubblebine, "Toward Acceptable Metrics of Authentication," Proc. 1997 IEEE Symp. Security and Privacy, pp. 10-20, May 1997.
[20] D. Ronen and Y. Perl, "Heuristics for Finding a Maximum Number of Disjoint Bounded Paths," Networks, vol. 14, pp. 531-544, 1984.
[21] F.B. Schneider, "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial," ACM Computing Surveys, vol. 22, no. 4, pp. 299-319, Dec. 1990.
[22] J.W. Suurballe, "Disjoint Paths in a Network," Networks, vol. 4, pp. 125-145, 1974.
[23] A. Tarah and C. Huitema, "Associating Metrics to Certification Paths," Proc. Computer Security—ESORICS '92, pp. 175-189, 1992.
[24] R. Yahalom, B. Klein, and T. Beth, "Trust Relationships in Secure Systems—A Distributed Authentication Perspective," Proc. 1993 IEEE Symp. Research in Security and Privacy, pp. 150-164, May 1993.
[25] R. Yahalom, B. Klein, and T. Beth, "Trust-Based Navigation in Distributed Systems," Computing Systems, vol. 7, no. 1, pp. 45-73, 1994.
[26] P. Zimmerman, The Official PGP User's Guide. MIT Press, 1995.

Index Terms:
Security, authentication, public key certificate, certificate path, independent paths.
Michael K. Reiter, Stuart G. Stubblebine, "Resilient Authentication Using Path Independence," IEEE Transactions on Computers, vol. 47, no. 12, pp. 1351-1362, Dec. 1998, doi:10.1109/12.737682
Usage of this product signifies your acceptance of the Terms of Use.