Phishing is the fastest growing threat in the history of Internet and has gained immense popularity amongst Internet fraudsters and hackers as a simple yet effective way to gain unsolicited access to confidential user information.
Using social engineering tactics, fraudsters ensure that the trust relationship established by a company with its customers is exploited to maximum effect. It is for this reason that moving towards stronger identity assurance techniques is the only long term strategy that will maintain the stability of the Internet.
Identity and authentication are fundamental concepts in every marketplace. People and institutions establish trust before conducting business. Traditionally there has been a reliance on physical credentials such as a business license or a letter of intent. In the age of the Internet, e-business will only succeed if this ability to pass trust remains consistent. Authenticated SSL certificates have been proven to provide the critical online identity assurance necessary to establish trust between parties. In fact the future success of a multitude of e-commerce eco- systems rests directly upon the continual strengthening of that trust relationship.
WHY DO WE NEED ENCRYPTION?
The Web presents a unique set of trust issues, which businesses must address at the outset to minimize risk. Consumers submit information and purchase goods or services via the Internet only when they are confident that their personal information, such as credit card numbers and financial data, is secure. The solution for businesses reliant upon e-commerce is to implement a complete e-commerce trust infrastructure based on encryption technology. Let us take a closer look at "encryption". The dictionary definition is:
intended recipient" how do you know who that entity is? The answer is you don't! So it would be fair to say from the definitions above that, if you don't know who you are encrypting for, then encryption is potentially pointless.
"High Assurance" certificate authorities (CAs) perform that authentication for you with due diligence, and put their name to this in the SSL certificates which they sign. This is not done by "Low Assurance" CAs which issue SSL certificates providing encryption of dubious worth. Let's look more specifically at other legal, technical and commercial issues facing consumers and businesses where entity authentication is not performed.
Should consumers take the 60,000,000:1 gamble on privacy and confidentiality?
Today, new web site registrations are running at approximately 5 million new domains per quarter with a cumulative total of over 60 Million . Without a pre-existing trust relationship, consumers have no trusted method available to verify the ownership of a web site and therefore are completely reliant upon the entity authentication processes performed by Certification Authorities. If no authentication process is performed then this forces consumers to gamble with privacy and confidentiality.
- "Third-party CAs are critical for some applications. For example, a bank that wishes to put a server on the Internet for online banking cannot just issue its own certificate to that server and ask customers to believe that it really is the bank's server. Instead, the bank will purchase a server certificate from a third-party CA. The third-party CA takes responsibility for performing due diligence and ensuring that the company requesting the certificate really is the company it says it is before issuing the certificate."
The use of SSL certificates is a critical building block for secure electronic commerce and one of the most ubiquitous uses of public key infrastructure (PKI). SSL certificates are "High Assurance" if they provide three security services - confidentiality, authentication and integrity. They enable a user to:
- Communicate securely with a web site - Information which the user then provides cannot be intercepted in transit (confidentiality) or altered without detection (integrity)
- Verify that the site is actually the company's web site and not an imposter's site (authentication) For example, an SSL certificate with the organizational name "ABC Software Inc." is intended to provide assurance that the Web site being viewed (e.g. www.abcsoftware.com) is actually an ABC Software Inc Web site (and not a "spoofed" site created specifically by another, unrelated entity to trick unsuspecting web surfers into doing business with someone pretending to be ABC Software Inc.) Why is it important? A domain name URL (uniform resource locator) is equivalent to a telephone number. It is assigned to a paying customer (organization or individual) for the period of time it is registered. The domain name system was designed to support open-systems information flow. While there are restrictions on certain types of domains (e.g. .mil is restricted to US military entities, .fr is restricted to organizations physically located in France), there are no such restrictions on .com, .org, .net and others. To register for these types of domains the individual or organization need only pay an annual fee. There is no requirement for registrars to verify the accuracy of the information provided.
- The validation techniques followed by Certification Authorities should constantly be reviewed, refined and improved.
- The techniques should be audited by a centralized independent body.
- Proven adherence to those techniques should form the minimum entry criteria for any Certification Authority to have their root certificates accepted by Browser providers. The goal of ever increasing security should drive future standards with entity authentication an absolute minimum where encryption and trust is required. After all, What is the point of encryption if you don't know who for? i. http://news.netcraft.com/archives/web_server_survey.html iii. http://www.eucybervote.org/Reports/MSI-WP2-D7V1-V1.0-02.htm v. http://archive.dante.net/np/ds/osi/9594-6-X.520.A4.ps Dr. Colin Walter has a formidable international reputation in the design of hardware and algorithms for the implementation of RSA cryptography. He is on the programme committee of several international conferences (e.g. CHES and ARITH) and has given invited lectures on many occasions. He obtained his doctorate in algebraic number theory from Cambridge University and he is a senior member of the IEEE. Colin is most well-known to the international community for his invention of the first ever purely locally connected systolic array for modular multiplication. This enables servers to perform the calculations for very large numbers of SSL key exchanges at once. Recent research has led to the MIST algorithm, patented by Comodo, which is a key ingredient in the secure implementation of electronic purses on smartcards.





No comments yet. Be the first to comment!