About that "Mighty Fortress"... What's it look like?
Ray Dillinger
bear at sonic.net
Fri Jul 30 22:40:49 EDT 2010
Assume, contra facto, that in some future iteration of PKI, it
works, and works very well.
What the heck does it look like?
At a guess.... Anybody can create a key (or key pair). They
get one clearly marked "private", which they're supposed to keep,
and one clearly marked "public", which they can give out to anybody
they want to correspond with.
Gaurantors and certifying authorities can "endorse" the public key
for specific purposes relating to their particular application.
Your landlord can "endorse" your keycard to allow you to get into
the apartment you rent, the state government can "endorse" your
key when you get a contractor's license or private investigator's
license or register a business to sell to consumers and pay taxes,
etc.
There are no certifying agencies other than interested parties
and people who issue licenses/guarantees for specific reasons.
You can use your private key to "endorse" somebody else's key
to allow them to do some particular thing (you have to write a
short note that says what) that involves you, or check someone
else's key to see if it's one that you've endorsed. If you've
endorsed it, you get back the short note that you wrote, telling
you what purpose you've endorsed it for.
Anybody who's endorsed a key can prove that they've endorsed it
by publishing their endorsement. You can read and verify public
endorsements using the public keys of the involved parties.
And you can revoke your endorsement of any particular key, at any
time, for any reason. The action won't affect other endorsements
of the same key, nor other endorsements you've made.
Finally, you can use your private key to prepare a revocation,
which can be held indefinitely in some backup storage, insurance
database, or safe-deposit box. If you ever lose your private key,
you send the revocation and everybody who has endorsed your
public key gets notified that it's no good anymore.
I think this model is simple enough to be understood by
ordinary people. It's also clear enough in its semantics to
be implemented in a straightforward way. Is it applicable
to the things we want to use a PKI for?
Bear
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list