

How Cryptology Can Fix Identity Theft
source link: https://ntietz.com/tech-blog/how-cryptology-can-fix-identity-theft/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

How Cryptology Can Fix Identity Theft
Sunday, February 22, 2015
Identity theft is a huge problem, costing Americans more than $4.5 billion in 2012. Identity theft victims frequently lose time and money and undergo significant mental hardships while dealing with the fallout. It can happen a few different ways, but one large attack vector is through the identity verification process.
Every time your identity is verified, one of the following mechanisms is probably used:
- an array of challenge questions ("what were your last two addresses?")
- submitting a copy of a physical document (passport or id card)
- providing your Social Security number (SSN)
All of these come with problems. They are subject to two main attack vectors: social engineering, where a bad actor may trick you into giving up this information to them directly; or bad actors within a legitimate organization that you have to provide the information to. The second attack vector is far more insidious, since you cannot do anything to prevent it. If you submit your SSN with a form at your local community college and an employee handling the form copies it down, it is lost -- but you had no choice and had to include the SSN.
Let's back up. What's the big problem here? Why are these mechanisms weak?
There are two classical problems in secure communications: authentication and encryption. Authentication is proving your identity. Encryption is protecting a message from all but the intended recipients. Together, these let you send messages which cannot be intercepted and can be demonstrated to be from you, not an impostor.
Traditional identity verification mechanisms are just means of authenticating your requests. These are based on shared information. Essentially, both Alice and Bob must have the same information to verify that Alice really is who she claims to be. Here's the problem: that means that Bob can then go to Mark and say "Hi, I'm Alice, here's proof!" and Mark would be fooled.
Solving this problem requires switching to an asymmetric information system. This is the same way that your bank's website proves that it is legitimate. A central authority, called the certificate authority (CA), issues a certificate to the bank. The bank holds private information it can use to sign a message (their private key), and then your browser checks the signature using the public certificate from the CA. No one else can impersonate the bank, because no one else has the bank's private key.
We can do the same thing for identity verification for people. With a central "Personal Identity Authority" (such a name evokes some dystopian imagery), we could issue every person a private and public key. The public keys would all be recorded so that anyone could see everyone else's public keys, but private keys would be held only be each individual. Then, identity proof would be done by a simple process. Imagine that Bob wants to verify Alice's identity:
- Bob would send Alice a short message (randomly generated, and unique each time).
- Alice would encrypt this message using her private key and send it back to Bob.
- Bob would retrieve Alice's public key and use it to decrypt Alice's message.
- If the received message matches the original one, then Alice is who she claims to be.
This system would be technically sound and would result in both far more secure identities and much higher confidence identity verification. However, it comes with problems of its own.
- Software systems would be necessary to implement the system. People can't encrypt random messages with large keys by hand. These systems are not awfully difficult to make (in fact, they already exist) but getting them integrated into everyone's phone, laptop, browser, and all the services they use, would be a significantly challenging endeavor.
- People would lose their private keys. If someone breaks their laptop or phone and their private key is lost, how would a new one be reissued? If you can use an old technique, like your SSN, to get a new key, then what would stop an attacker from simply pretending to be you and getting a new public/private key pair associated with your identity?
- People can have their private keys stolen. This could happen through security holes in their laptops and phones, or through social engineering to convince people to give up their private keys voluntarily.
- A great deal of trust is now placed in one central authority. This authority must be trusted not just to manage your identity, but also to be responsible with a lot of information. All requests for your public key would be signals that you are authenticating in different places (Facebook wants your public key? That is a signal that you just used Facebook.), so the central authority would have a new wealth of tracking data.
I hope that within my lifetime, I can see symmetric information stop being used for identity verification. However, I also hope that these issues can be solved well before we implement any such system.
Recommend
-
21
-
9
Key Agreement for Decentralized Secure Group Messaging with Strong Security GuaranteesCryptology ePrint Archive: Report 2020/1281 Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees...
-
6
The 5 Best Identity Theft Protection & Monitoring Services of 2021 By Ankush Das Published 12 hours ago...
-
9
2021-04-18 17:11 融资新闻 | Cryptology Asset Group完成3200万欧元融资,准备探索购买比特币 Cryptology Asset Group 3200万欧元 ...
-
11
Identity fraud never sleeps. Neither does t...
-
8
Got Credit on Wunderstock Guest Opinion: No one ever wants to believe they’re victims of identity theft, but with nearly 1.38 million cases reported in the United States alone...
-
9
Technology ...
-
5
There are a lot of great things about living in an era governed by big data. Big data creates a lot of new opportunities in business and our personal lives. However, there are also downsides to the sudden influx of data in the 21...
-
11
Cryptology vs. Cryptography: What's the Difference? By Jake Harfield Published 10 hours ago Crypto this and crypto that, it's al...
-
7
4 Effective Ways to Protect Yourself Against Identity Theft Over 50 million people have been
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK