there are two parts of certificate design point (not just one)
1) no prior relationship (i.e. except in the introductory stage, not applicable for financial infrastructure) 2) offline (not applicable in the online payment infrastructure) all things considered somebody that is being paid would prefer an online, realtime notification that the financial institution says that the money is available and is being transferred (i.e. if they get their money they don't actually need to know who you are .... which is the EU directive that point-of-sale electronic financial transactions are as anonymous as case). it is only when things regress to pre-1970 technology into an offline world that a poor 2nd choice is to know who you are ... as opposed do i already have the money. another payment scenario from pre-1970.. are corporate checks that had signing limits printed on the checks (somewhat analogious to certificates of a particular kind). they discovered that fraud was happening by people signing 200 $5000 checks for $1m ... aka no real time aggregation. The transition was made from signing check limits to real-time aggregation. given an online infrastructure .... is it better to have transaction built around stale, static data ... or transaction built around real-time aggregation information. The design point of "trusted" stale, static data (aka some sort of credential or certificate) in an offline system is better than having no information aka that was the original invention justification for certificates .... not having an online system to get real-time, up-to-date transaction aggregation information (if you are in a pre-1970 technology situation ... with offline payment transaction ... then some sort of certificate is better than not having anything). However, given that there possibly is the availability of a post-1970 online technology ... that it would appear to be a better choice to go with an online transaction as opposed to an offline transaction paradigm. Now some of the past payment related certificates have been in the 1k to 4k byte range. There is significant portion of payment transaction that currently operate with 80-100 bytes. The x9.59 mapping to ISO 85838 networks has one the order of 80 byte payload increase ... 42byte ecdsa, fips186-2 signature plus misc. other information for increased integrity. I believe that some of the x9 sixty-something certificate compression is talking about a simple straight-foward something on the order of 300 bytes for a ecc (163-bit) public key and a 42 byte ecdsa signature. note however, that the whole design point for such a certificate is to be able to authenticate an offline transaction ... since the certificate is redundant and superfulous in online transactions processed by the customer's financial institution. There is some push back on the unique information in the x9.59 addenda since it almost doubles the size of existing payment transaction. The pushback is even worse when considering an optimized, compressed, 300-byte ecc certificate that is totally redundant and superfulous and servces no valid business purpose. Note however, that if such a certificate were to contain any identification information and it was viewed by any but the customer's financial institution then it would be in violation of the EU's anonymous directive. Now, the financial institution doesn't need the certificate ... since it already has all the information. The merchant doesn't need know anything from the certificate if there is a realtime online transaction that gives a real-time commitment from the financial institution that 1) it is a valid transaction from 2) a valid customer account, 3) there is sufficient funds, and 4) the bank is transferring the funds. Part of this is that it is post-1970, there is significant world-wide coverage for doing online transaction, that being able to do online, real-time, payment authorization taken into account real-time account transaction aggregated information .... is of higher quality than an offline transaction with static, stale information possibly year or more old. with regard to legacy systems (including stove-pipe legacy systems), i made the statement that there is a much larger upfront cost to integrate public key support into existing production system ... as compared to the upfront cost to deploy a brand new server with new operation (especially if it is a simple SSL-like certificate manufactoring ... as opposed to full-blown PKI). The problems that have cropped up in financial consumer certificate issuing (whether PKI or simple certificate issuing) ... is that there is the issue of keeping a customer database. that customer database then has to eventually have all the customer activity support as the "real" production customer account database operation. The presentation made at NISSC (previously mentioned) calculated that the cross-over point for financial institutions between the upfront cost reduction of doing a separate PKI operation ... as opposed to modifying the stove-pipe legacy stuff for public key authentication was somewhere around 5 percent of the account base. If financial infrastructure was looking at supporting less then five percent of its customer base with public key authentication ... then a separate PKI "stove-pipe" was probably cheaper. If the financial infrastructure was looking at supporting public key authentication for more than about five percent of its customer base ... then it was probably cheaper to modify the existing stove-pipes (than it was to effectively create a new and separate stove-pipe for PKI). my statement has always been that a trusted static stale certificate/credential is always better than nothing when you are in an offline world and don't have access to real-time, online information. However, for almost anything of importance or value ... given the opportunity of doing either 1) a real-time online transaction or 2) doing a offline, delayed transaction based on static stale certificate ... which would one choose. Given a infrastructure that is in general moving towards online, real-time .... the multiple legacy stove-pipe situation would be aggrevated with yet another (PKI) stove-pipe (in other than very early technology exploratory pilot stages) Given some infrastructure that is really an offline environment ... then it is obvious that a trusted, static, stale credential/certificate is better than nothing at all. The statement that certificates are redundant and superfulous in an online, realtime payment transaction infrastructures is in no intended to imply that they are totally useless and/or don't have application. They were specifically invented for offline environment for parties that have had no prior relationship/knowledge. Something as an aside, the online payment infrastructure ... is in effect an online certification authority paradigm ... with realtime online ransactions as opposed to trusted static stale credential/certificate offline paradigm. It turns out that the certificate issuing certification authorities actually make extensive use of this realtime online feature for some number of consumer/client certificates they issue. They effectively take a credit card in payment for the credential they issue ... and for the basic credential type with name and address use the name/address verification option of the realtime credit card transaction as the means of checking the name and address. There are some number of other web-based "certification" sites (some doing realtime transactions in lieu of static stale credentials and others that issue a form of short-lived credentials ... possibly analogous to kerberos tokens) that also rely on the name/address verification option of the realtime credit card transaction as the means of checking name and address. [EMAIL PROTECTED] on 5/30/2002 8:25 am wrote: Lynn, You do put an interesting interpretation on things. A few points worth noting: (1) Letters of credit are very much alive, today, having survived the invention of the telegraph, the telephone, and, so far, the invention of the Internet. They are in regular use for lots of global commerce activities. There are even electronic versions of letters of credit. Suffice it to say that there is still value in being able to extend one's business reputation (credit) beyond one's normal domain of operations. (2) To put things in perspective, the primary contributors to the "onerous payload" in X.509 certificates are the public keys themselves. Next are the signature blocks of the issuers. Basic X.509 certificates do little more than provide the name of the subject of the certificate, the name of the issuer, and some basic management information, such as the starting and ending dates for when the cert is valid. Plastic mag-stripe credit cards actually carry a lot more information than do basic X.509 certs (although public keys are longer than credit card numbers). True, there are lots of optional fields and extensions in the X.509 standards, but even when these are used, they generally don't add that much bulk (unless someone really does stick the entire certificate practice statement into the cert). [Please, before you respond with a list of your favorite stats on cert size and hyperlinks to your voluminous archives, read on and recognize that none of this really matters until we better understand what we're trying to accomplish.] (3) While it is true that you don't need a cert in the case where the issuer is the only party that will rely on the cert, this is not the typical case in most business situations. Even banks tend to have lots of stovepipe operations that have no good internal means for sharing information about customers and their reputations. Many other businesses are also comprised of multiple stovepipes. There may also be good reasons that the "Bank of England" (to cite your example) might issue a letter of credit to a customer based in England to help facilitate their opening of an account at the Bank of England branch in some other part of the world. If all the legacy systems in place today could effectively exchange information in a trustable fashion, then maybe such "inefficiencies" would not be required--but they don't! It might also be worth noting that payments are between _payers_ and _payees_. Goverment Treasuries, banks and payment service providers merely facilitate the payment transactions and provide some "insurance" for a subset of the payment transactional risks. The key point is that payer-payee transactions are highly distributed in nature, and often between parties that have little or no transactional history with each other. Just a suggestion, but maybe we need to focus a bit more on how to facilitate payer-payee interactions and give payers and payees the tools they need to manage the very real risks they confront with every payment transaction. The reason I provided some commentary on the editorial by Scott Berinato was that I'd like to see the industry dialogue move away from arguments about the machinery, and to more on-topic discussions of what it will take to create viable payment applications that can be conducted safely over the Internet. With a better understanding of user needs, system requirements, and appropriate architectures for new payment applications, perhaps we will then have the insight to intelligently evaluate what sorts of machinery will actually serve our purposes. As I've already emphasized, the PKI approach is on the wrong path. But, if you'll forgive me for saying so, I contend that your approach is also not showing a great deal of promise these days. To be honest, only a narrow set of applications is served by a model where the issuer of public key credentials is also the only relying party. This might work for some highly centralized application models with rigid constraints on the relationships between the players. It is, perhaps, even a good model for extending some legacy systems, especially where closed protocols and networks are used. Personally, I think it is a good idea to look at how new payment applications can leverage, and even extend, legacy payments infrastructure. On the other hand, I think it would be a mistake to continue the practice of stamping out new payment applications and innovative approaches for the sake of protecting existing payment system franchises that are protected by closed systems designs and technological constraints from the 70s and 80s. But that's just one man's opinion. Regards... -- ...Chuck Wade Consultant, Internet Security and Financial Services +1 508 625-1137 Office Phone/Voice Mail +1 309 422-9871 Fax Service