Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: AndyTheBear

“That would be pointless and backward. Think about how key pairs are used by ssh.”

I didn’t explain this very well. To clarify, both the .gov and individuals would have private keys.

The difference is that the .gov would use their private key to sign ALL the IDs in the system. The individual’s private key would only validate themselves.

So again, if the .gov private key is compromised, all other issued keys would need to be revoked and replaced.


54 posted on 10/04/2017 9:15:15 AM PDT by ConservativeWarrior (Fall down 7 times, stand up 8. - Japanese proverb)
[ Post Reply | Private Reply | To 40 | View Replies ]


To: ConservativeWarrior
The difference is that the .gov would use their private key to sign ALL the IDs in the system. The individual’s private key would only validate themselves.

How will you generate your private key?

How would you revoke it if you lost it?(I'd recommend creating both the revocation cert and the private key at the same time and submitting both, but then you'd have a really interesting way for the governement to quickly DOS the person, by sending out their revocation cert when they wanted to cause them really serious issues.)

How do you re-authenticate in case you lose it?

How do you prove that someone has stolen yours? (this is a serious issue)

70 posted on 10/04/2017 11:23:24 AM PDT by zeugma (I live in the present due to the constraints of the Space-Time Continuum. —Hank Green)
[ Post Reply | Private Reply | To 54 | View Replies ]

To: ConservativeWarrior
Ah I see, I think....

Seems to defeat the purpose of having key pairs for validation.

When I think of a design for the problem, I keep thinking that key pairs are only useful as a replacement for passwords. Seems each person in the system would still need an id number or the like associated with the public key. Presuming a relational db, they could have the public key be an index to the id of the user in a separate table or db, that can be updated when someone has to change their key pair....and then the id would reference everything else about the person. So somebody signs in say to access their SS benefits, and the server checks what public key their private key solves, and then sees what user is associated with that public key.

They could try to use the public key as the id itself, but that is problematic and could cause transaction/syncing issues with all the other tables and various databases when one tries to change their key pair.

76 posted on 10/04/2017 11:47:49 AM PDT by AndyTheBear
[ Post Reply | Private Reply | To 54 | View Replies ]

To: ConservativeWarrior; AndyTheBear; zeugma
"The difference is that the .gov would use their private key to sign ALL the IDs in the system."

"...if the .gov private key is compromised, all other issued keys would need to be revoked and replaced."


Why would the govt need to sign the public keys? Just publish them on a govt web site - no signing or management needed. Anybody and everybody can have your public key and they can't do anything with it that would allow them to impersonate you. They can send you an encrypted message with it that only you (with your private key) can decrypt but they can't send a message as you or sign a document as you.

AndyTheBear has it right as to how public/private keys would work as secure personal identifiers.

Zeugma has it right as to how "normal" people would be incapable of using and maintaining the security of such a system.
90 posted on 10/04/2017 3:03:45 PM PDT by Garth Tater (Gone Galt and I ain't coming back.)
[ Post Reply | Private Reply | To 54 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson