Do You Need a Digital ID?
Anne & Lynn Wheeler
lynn at garlic.com
Wed Mar 23 15:57:13 EST 2005
Anne & Lynn Wheeler wrote:
> 3-factor authentication paradigm obviously also doesn't cover whether
> the authentication is direct fact-to-face or that the relying party is
> infering authentication taking place by the existance of other kinds of
> evidence. for instance, a relying party validating a digital signature
> with a public key will infer that the other party is in possession of
> the corresponding private key. the relying party may not have direct
i.e.
http://www.garlic.com/~lynn/aadsm19.htm#5 Do You Need a Digital ID?
one of the possible side-effects of applying 3-factor authentication
paradigm ... and observing that
1) the verification of a digital signature is just a method
of inferring the possession of a specific private key
2) the possession of a private key obviously (theoritically possible,
but i know of not instances of people memorizing private keys) isn't
"something you know" authentication and a private key isn't "something
you are" authentication ... leaving it to be "something you have"
authentication (aka in your possession)
3) private keys in their simplest form are just electronic bits that are
relatively easy to copy
then in order for a private key to be useful in a "something you have"
authentication, it follows fairly staight-forwardly that significant
security procedures and countermeasures are required to prevent such
copying (in order to provide some level of assurance that the assumed
entity is consistantly and uniquely in possession of the specific
private key).
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list