Non-profit, member-based IT support for research & educational institutions


Copyright 1999, The Chronicle of Higher Education.

Reprinted with permission. This article may not be posted, published, or distributed without permission from The Chronicle. https://chronicle.com

From the issue dated December 10, 1999

Do 'Digital Certificates' Hold the Key to Colleges' On-Line Activities?

Several institutions experiment with technology designed to identify who is using a computer

By FLORENCE OLSEN

Cambridge, Mass.

Facing a growing need to verify the identities of students and employees for on-line transactions, a handful of universities have begun issuing high-tech "digital certificates" that are nearly impossible for hackers to tamper with.

Because the portable electronic identifiers are highly efficient at proving to other computers that people are who their computers say they are, officials at some leading research universities say that certificates have dozens, if not hundreds, of potential uses.

Administrators hope to rely on the digital certificates as they make more and more of their campus functions "self-service" -- for example, letting students register for courses on line. And the certificates may let network administrators determine who gets to take advantage of new high-speed links created by projects like Internet2.

A digital certificate is a tiny, coded file with identifying information about an individual or institution. Associated with the certificate is a pair of encryption keys, one private and one public. The public key lends its name to "public-key infrastructure" -- the software, policies, and practices for managing digital certificates.

Research librarians may have the most pressing need for certificates, to help their users gain access to data bases and electronic copies of journals outside of their campus collections.

Most research institutions are not yet issuing digital certificates, however, because publishers of the electronic data bases they subscribe to don't have their servers set up to accept certificates, says Eric F. Celeste, assistant director for technology planning and administration for the Massachusetts Institute of Technology's libraries. The publishers see little reason to invest in the technology until universities do the same. "They look around and ask, 'Who's got certificates? Why should we spend energy on this?'" he says.

That stalemate is what prompted M.I.T. and the Corporation for Research and Educational Networking, a non-profit organization of colleges and universities, to offer a service for validating the digital certificates of higher-education and research institutions that meet CREN's strict technical and business standards. By using the service, an institution could avoid the complex business and technical agreements that it would otherwise need to negotiate, on its own, to insure that its certificates would be accepted by other universities and electronic publishers.

The new service, which created its first certificates last month, could have the effect of "bootstrapping" colleges that might otherwise lag in adopting an important technology for conducting transactions with other institutions over the Internet, says Jeffrey I. Schiller, manager of network services for M.I.T. and the principal architect of CREN's certificate service.

Many technology experts, Mr. Schiller among them, think that institutions will quickly find new uses for digital certificates, and the encryption keys associated with them, if the cost is reasonable and they learn how to manage thousands of certificates.

As they get comfortable with the technology, some computing officials say they may begin using it to put electronic signatures on official documents or, in some cases, to encrypt sensitive personnel documents.

But cost could also affect how quickly universities begin using certificates on a scale larger than that of the current pilot projects, campus-computing officials say.

One day last month, Mr. Schiller was the center of attention for about three dozen university officials who crowded into Room 302 of the Muckley Building on the M.I.T. campus here. His equipment on that day was a specially engineered certificate server that could be activated only by a physical key. The small gathering watched as he turned the key and generated its more-complex digital equivalent, a "root key" for creating CREN certificates. The key was a sequence of 2,048 characters, making it "very, very hard" for hackers to break, he said.

As Mr. Schiller carefully executed the initial steps in generating the root key, several college officials who were present said the occasion was "historic." After generating the key, Mr. Schiller used it to sign the first CREN institutional certificate, which was issued to Princeton University.

CREN has since issued certificates to M.I.T. and the Georgia Institute of Technology as well. The institutions will in turn use those to create personal digital certificates for their students and staff and faculty members. The certificates, stored in users' Web browsers, will be linked to those of the institutions, verifying both the identity of the individual user and the user's connection to a specific university.

In the case of a user who is seeking access to an on-line journal, for instance, the certificate would act as a "simple, anonymous library card that the publisher's server recognizes as valid because the certificate has the CREN signature," says Judith V. Boettcher, CREN's executive director.

Digital certificates are designed to resolve problems like the ones facing the libraries at M.I.T. About three years ago, students and employees at M.I.T. began paying Internet-service providers commercial rates for connections, which in many cases were cheaper that those offered through the institution. That shift gave them addresses that didn't end in "mit.edu." Soon many of them found they were barred from library resources because their addresses could not be recognized as originating at M.I.T.

As a stop-gap measure, M.I.T. installed a proxy server, into which M.I.T.'s library users can dial from anywhere to gain access to licensed data bases. But before that could happen, M.I.T. officials had to persuade more than 60 data-base and journal publishers to accept requests routed through the proxy server.

Most of the publishers agreed to do so. But M.I.T.'s Mr. Celeste says proxy servers are "terrible" to manage, and M.I.T. looks forward to replacing them with a digital-certificate system.

M.I.T. officials have begun talking about other uses, too, for the university's CREN-based certificates. "As we roll out certificate-authenticated services on campus," Mr. Schiller says, "alums may want to get access to those services" -- such as permanent M.I.T. e-mail addresses, which the university now offers to its graduates.

Several other research universities, among them the University of California system and Columbia University, are planning in 2000 to expand pilot projects in which they have issued digital certificates to some of their library users.

So far, verifying a person's identity on the Internet is the only use for which the University of California system has approved digital certificates, says David Wasley, an information-resources official in the university president's office.

Mr. Wasley thinks it could be several years before the California system is able to rely on the technology for a variety of daily operations. "We really want to get more practical experience and feedback," he says. Eventually, however, system officials want to use digital certificates to guarantee "the validity and auditability" of all university business conducted over the Internet, Mr. Wasley says.

Georgia Tech intends to rely on digital certificates "across every regime," for administrative, academic, and research purposes, says Gordon Wishon, associate vice-president and associate vice-provost for information technology. The university, which is installing an electronic-procurement system from the PeopleSoft Corporation, will need digital certificates to prove that transactions have been initiated and authorized by the appropriate people, he says.

Universities with Defense Department research contracts will probably be the early adopters of certificate technology, says David J. Hogarth, administrative assistant to the assistant provost at M.I.T. The department has announced that it intends to have digital certificates for its four million civilian and military employees and contractors by the end of 2002.

As with any new technology, the importance of having appropriate policies and procedures in place for handling digital certificates can't be overlooked, says Ira H. Fuchs, vice-president for computing and information technology at Princeton, which will use its new digital certificates to identify library users to electronic publishers whose data bases and journals the library has licensed. Mr. Fuchs is also the founder and president of CREN and the chief scientist of JSTOR, a non-profit organization that offers a data base of back issues of academic journals.

Mr. Fuchs says the policy questions will "get very sticky" unless universities think clearly about what they are doing before they start issuing digital certificates to everyone -- leaving themselves "no way to undo what they've done." Among the "sticky" issues, he says, is how to handle the "escrow" keys, used for decoding, that institutions will need if they plan to encrypt documents.

To realize the full potential of digital certificates, institutions will need standards for managing different levels of access to digital information, Mr. Wasley says. Budgetary and financial information, personnel data, and even network services, for example, are resources for which universities should offer different levels of controlled access.

Internet2's promise of providing a better network for scientific research, he says, "will be meaningless" without access controls. "You don't want high-definition television coming out of the dormitory, tying up Internet2," agrees Clifford A. Lynch, executive director of the Coalition for Networked Information, a consortium that promotes the use of computer networks. Digital certificates, he says, are the answer.

Cost, at least initially, could limit the use of digital certificates to a small number of well-heeled research universities. Commercial outfits that charge on a per-certificate basis -- even at 2 cents each -- may price themselves out of the university market, according to Mr. Wasley, who says "the cost model is very important." But if a university purchased a site license for its entire population, he says, it "could issue three million or 30 million certificates -- it wouldn't change the cost."

CREN's certificate service is free to members of CREN and available for a fee to non-members. Only about a half-dozen certificate-service providers operate today, including those run by the federal government and by several large companies.

How quickly electronic publishers and other users begin to accept electronic certificates from CREN or other certificate authorities may ultimately depend on how easy it is to set up servers that recognize the certificates. Columbia's experience in a pilot project with the OCLC Online Computer Library Center and JSTOR "leads us to think it's not that hard," says David Millman, manager of research and development for academic information systems at Columbia.

Leah Houser, the manager of OCLC's reference services, says her biggest concern is the prospect of having to work with too many certificate-server configurations put together by different colleges and universities. If universities wind up using widely dissimilar technical approaches, she says, managing certificates could become "onerous" for electronic publishers.

Electronic publishers also may have to be persuaded that digital certificates are not just the latest gee-whiz fad. "We have to sell them on the fact that this is not something that we're going to experiment with, see what happens, and then throw it away," says Ron Hutchins, director of engineering at Georgia Tech. Digital certificates will be the infrastructure on which, he says, "our future depends."

https://chronicle.com
Section: Information Technology
Page: A47