[17947] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: ID "theft" -- so what?

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Tue Jul 19 17:14:54 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: cryptography@metzdowd.com, jamesd@echeque.com
In-Reply-To: <42D6806B.31035.33F925B@localhost>
Date: Mon, 18 Jul 2005 04:01:17 +1200

"James A. Donald" <jamesd@echeque.com> writes:

>The PKI that was designed to serve no very useful function other than make
>everyone in the world pay $100 a year to Verisign is dead.
>
>Yet the technology is potent, and the problems of identity and authenticity
>are severe.  We shall, bye and bye, see reliance on public keys.  Other
>things just don't work.

What makes you so sure of that?  When I looked at this ("Plug-and-play PKI: A
PKI your Mother can Use", available from my home page), I found that by the
time you'd hidden enough of the PKI complexity to make it user-friendly, you
had something that was indistinguishable from a username-and-password
interface.  Conversely, as soon as you start surfacing any of the PKI arcana,
it becomes unusable by the majority of users.

Currently the best way that I know of securing an SSL link is through the use
of TLS-PSK, which provides mutual authentication of client and server as part
of the TLS handshake without requiring any public-key technology at all.  This
also happens to be the most usable security technology around - even your
mother can use it, and since the TLS handshake will fail in a very obvious
manner if she connects to a spoofed site, there's no need to rely on users
mastering PKI/PKC arcana for the security to work.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post