Email-Based Identification and Authentication: An Alternative to PKI?
نویسنده
چکیده
F or more than a decade, businesses, governments, universities, and other organizations have developed and deployed identification–authentication systems based on public-key infrastructure (PKI). But despite this strong institutional support, an alternative system for identification and authentication organically evolved, improved, and spread during recent years. This identification–authentication regime is not based on public-key cryptography, but instead on the ability to receive email sent to a particular address. In this article, I argue that despite some security shortcomings , email-based identification and authentication (EBIA) is a reasonable approach for many current commercial and government applications. EBIA provides a better match to the usability, privacy, autonomy, resiliency, and real-world business requirements than PKI technology. Today, even sensitive applications that let us enter into binding business agreements worth thousands of dollars (for example, on eBay) and electronically transfer money between bank accounts (for example, with PayPal), use EBIA. Here, I analyze its advantages and weaknesses, discuss best practices for its continued use, and show how EBIA might evolve into a system with stronger security properties. The " Related work " textbox on page 24 describes other PKI alternatives in progress. Personal identifiers typically are names, symbols, or codes that represent a human being. Identifiers can be contextu-ally or globally unique: There is only one George Bush who lives at 1600 Pennsylvania Avenue in Washington, D.C., but there are two people named George Bush in the New York City telephone directory and another 15 elsewhere in New York state. Sometimes different people can use the same identi-fier—a family can share a telephone number, for example. Other applications require singularly unique identifiers. In 1936, the Social Security Board adopted the nine-digit social security number (SSN) system to track the earnings of different Americans with the same names. The 1935 Social Security Act required tracking each American's earnings through his or her employment lifetime because it based, in part, retirement benefits on lifetime earnings (see " The History of Social Security; " www.ssa.gov/ history/). Thus, while two people living today in New York City have the George Bush name, each of them should have a unique SSN. Moreover, those numbers should be different from that of the George Bush living on Pennsylvania Avenue in Washington, D.C., and every other person cataloged in the social security system. Universal identifiers, which the SSN has become, are identifiers used simultaneously by different organizations. But not all universal identifiers were designed …
منابع مشابه
A Secure Email System Based on Identity Based Encryption ISSN 2319 - 6629
Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have th...
متن کاملThe PKI authentication system with the integration of Biometric identification and non- symmetric key technology
To deal with the threats to the PKI authentication system from the internet and the real world, based on the analysis of biometric identification and nonsymmetric key technology, this paper presented a new PKI authentication system through the integration of Biometric identification and non-symmetric key technology, which assembled their advantages and made up their disadvantages to each other ...
متن کاملPractical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System
Email is currently the most widely used communication system in daily life. To improve security and efficiency, most email systems adopt Public Key Infrastructure (PKI) as the mechanism to implement security, but PKI based systems suffer from expensive certificate management and problems in scalability. Identity Based Cryptography (IBC) is another method, but it has the inherent drawback of Key...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملSeparable Identity-Based Ring Signatures: Theoretical Foundations For Fighting Phishing Attacks
Email phishing attacks are one of today’s most common and costly forms of digital identity theft, where an adversary tricks a user into revealing their personal information by impersonating an established company. Such attacks could be mitigated with digitally-signed emails, if these signatures did not: (1) destroy the traditional repudiability of email, and (2) require the unrealistic, widespr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Security & Privacy
دوره 1 شماره
صفحات -
تاریخ انتشار 2003