A Comparison of Certificate Validation Methods for Use in a Web Environment

By Shimshon Berkovits , Jonathan Herzog

This paper reports on an investigation into several differing certificate validation techniques.

Download Resources


PDF Accessibility

One or more of the PDF files on this page fall under E202.2 Legacy Exceptions and may not be completely accessible. You may request an accessible version of a PDF using the form on the Contact Us page.

This paper reports on an investigation into several differing certificate validation techniques. It compares their mechanisms and, more importantly, their performance. An analysis is presented showing the largest number of validator clients that each validation method can support. This is done in each of five differing scenarios, scenarios that are encountered in a web environment. The effect of caching validation information is also examined. Finally, a new, hybrid method for disseminating certificate validity information is presented and recommendations are made for which method to use in varying circumstances.