Does identity management clash with privacy
http://www.infoworld.com/reports/SRidmgmtandprivacy.html

Frequently it seems that it isn't an identity management issue, but
confusing identification and authentication.

One of the things in X9.59 was rather than trying to blanket the world with
deep layers of encryption (in order to protect credit card numbers, which
still had to appear in the clear because of numerous business process
issues) was to convert the information from shared-secret (needing hiding,
privacy, confidentiality and encryption) to a non-shared secret with
authentication.

In the existing process with non-authenticated transactions, just learning
a credit card number is sufficient for somebody to generate a fraudulent
transaction (effectively making the credit card number a shared-secret and
classified as one of the identity theft items). x9.59 changes the
transactions from non-authenticated to authenticated and eliminates the
ability to use an (x9.59) account number in fraudulent transactions. Not
being able to use the account number for fraudulent transactions eliminates
it as being classified as shared-secret or target of identity theft. In the
non-authenticatted paradigm, it was not possible to bury the earth under
deep enough layer of encryption to really protect it, since it was required
to be in the clear as part of so many business processes.

Part of the issue is being able to strongly characterize and differentiate
authentication from identification. Changing a paradigm from
identification-basd to authentication-based goes much further to protecting
individuals, aka extermely strong encryption for protecting shared-secret,
sensitive, and confidential information may be good, but not having
shared-secret, sensitive, and confidential information is even better.

Electronic transactions tend to involve authentication and permissions (or
authorizations). Permissions and authorizations may also be considered as
class of sensitive and confidential information (say like printing the
current credit limit). Good protocols might be considered to be some simple
authenticated request or assertion with simple yes/no response.  This was
the paradigm followed in X9.59 protocol work as well in the FSTC FAST work
(effectively a debit-like transactions but instead of making an assertion
about payment that was approved or not, the FAST assertions were about
other facts like age limit, local liqueur/gambling regulations, etc).  In
the FAST scenario, it wasn't necessary to divulge a person's birth date, it
was sufficient to assert that they were over 21 (or 18) and validate the
assertion.

misc past authentication/identification threads:
http://www.garlic.com/~lynn/aepay10.htm#5 I-P: WHY I LOVE BIOMETRICS BY
DOROTHY E. DENNING
http://www.garlic.com/~lynn/aepay10.htm#77 Invisible Ink, E-signatures slow
to broadly catch on (addenda)
http://www.garlic.com/~lynn/aepay11.htm#53 Authentication white paper
http://www.garlic.com/~lynn/aepay11.htm#58 PKI's not working
http://www.garlic.com/~lynn/aepay11.htm#60 PKI's not working
http://www.garlic.com/~lynn/aadsm10.htm#cfppki15 CFP: PKI research workshop
http://www.garlic.com/~lynn/aadsm10.htm#cfppki18 CFP: PKI research workshop
http://www.garlic.com/~lynn/aadsm10.htm#paiin PAIIN security glossary &
taxonomy
http://www.garlic.com/~lynn/aadsm10.htm#anonpay Crypto Winter (Re: Looking
back ten years: Another Cypherpunks failure)
http://www.garlic.com/~lynn/aadsm10.htm#bio3 biometrics (addenda)
http://www.garlic.com/~lynn/aadsm11.htm#14 Meaning of Non-repudiation
http://www.garlic.com/~lynn/aadsm11.htm#39 ALARMED ... Only Mostly Dead ...
RIP PKI .. addenda
http://www.garlic.com/~lynn/aadsm12.htm#32 Employee Certificates - Security
Issues
http://www.garlic.com/~lynn/aadsm12.htm#39 Identification = Payment
Transaction?
http://www.garlic.com/~lynn/aadsm12.htm#53 TTPs & AADS Was: First Data Unit
Says It's Untangling Authentication
http://www.garlic.com/~lynn/aadsm13.htm#12 Antwort: Re: Real-time
Certificate Status Facility for OCSP - (RTCS)
http://www.garlic.com/~lynn/aadsm13.htm#20 surrogate/agent addenda (long)
http://www.garlic.com/~lynn/aadsm14.htm#13 A Trial Balloon to Ban Email?
http://www.garlic.com/~lynn/aadsm14.htm#32 An attack on paypal
http://www.garlic.com/~lynn/aadsm14.htm#33 An attack on paypal
http://www.garlic.com/~lynn/aadsm14.htm#39 An attack on paypal
http://www.garlic.com/~lynn/aadsm14.htm#40 The real problem that https has
conspicuously failed to fix
http://www.garlic.com/~lynn/aadsm14.htm#41 certificates & the alternative
view
http://www.garlic.com/~lynn/98.html#41 AADS, X9.59, & privacy
http://www.garlic.com/~lynn/99.html#224 X9.59/AADS announcement at BAI this
week
http://www.garlic.com/~lynn/99.html#226 Attacks on a PKI
http://www.garlic.com/~lynn/2001c.html#8 Server authentication
http://www.garlic.com/~lynn/2001f.html#31 Remove the name from credit
cards!
http://www.garlic.com/~lynn/2001j.html#52 Are client certificates really
secure?
http://www.garlic.com/~lynn/2001k.html#1 Are client certificates really
secure?
http://www.garlic.com/~lynn/2002.html#39 Buffer overflow
http://www.garlic.com/~lynn/2002e.html#18 Opinion  on smartcard security
requested
http://www.garlic.com/~lynn/2002e.html#36 Crypting with Fingerprints ?
http://www.garlic.com/~lynn/2002f.html#22 Biometric Encryption: the
solution for network intruders?
http://www.garlic.com/~lynn/2002g.html#66 Formal Classification for
Security Topics
http://www.garlic.com/~lynn/2002j.html#40 Beginner question on Security
http://www.garlic.com/~lynn/2002m.html#19 A new e-commerce security
proposal
http://www.garlic.com/~lynn/2002m.html#53 Authentication of others is a
privilege, not a right
http://www.garlic.com/~lynn/2002n.html#13 Help! Good protocol for national
ID card?
http://www.garlic.com/~lynn/2002n.html#19 Help! Good protocol for national
ID card?
http://www.garlic.com/~lynn/2002n.html#25 Help! Good protocol for national
ID card?
http://www.garlic.com/~lynn/2002n.html#30 Help! Good protocol for national
ID card?
http://www.garlic.com/~lynn/2002o.html#57 Certificate Authority: Industry
vs. Government
http://www.garlic.com/~lynn/2002p.html#22 Cirtificate Authorities 'CAs',
how curruptable are they to
http://www.garlic.com/~lynn/2002p.html#50 Cirtificate Authorities 'CAs',
how curruptable are they to
http://www.garlic.com/~lynn/2003f.html#35 Public Encryption Key
http://www.garlic.com/~lynn/2003f.html#37 unix
http://www.garlic.com/~lynn/2003h.html#18 Authentication protocol
http://www.garlic.com/~lynn/2003i.html#35 electronic-ID and key-generation

--
Internet trivia, 20th anv: http://www.garlic.com/~lynn/rfcietff.htm

Reply via email to