(c) Why Use Certificates?
{3.11} There are three primary goals that can be facilitated
by a PKI: authentication, non-repudiation and message integrity.
To varying degrees, certificates can play a role in fostering
these objectives. A fourth goal of a PKI, confidentiality, raises
issues outside the scope of this Report.
{3.12} This Report focuses on the use of certificates to promote
authentication. In this context, authentication means confirming
the identity of a party. Merchants would desire authentication
of consumers as a way to enhance the likelihood that they are
dealing with the person who is in fact the true owner of the public
key. This promotes merchant comfort that the transaction is legitimately
placed and provides potential recourse in the event there is a
problem.
{3.13} Conversely, although not dealt with specifically in this
Report, consumers will want certificates from merchants to authenticate
merchant identity. Consumers would desire authentication of merchants
as a way to enhance the likelihood that they are dealing with
the merchant who is in fact the true owner of the public key.
This promotes consumer comfort that the ordering information
(including terms about payment mechanisms) is not being collected
by a party who intends to abuse the ordering information.
{3.14} Non-repudiation means that a person making a statement
(such as a consumer placing an order) is not able to deny making
the statement. If the mechanisms to authenticate identity work
properly, the goal of non-repudiation would be facilitated; if
identity is confirmed, there would be few grounds on which the
consumer could say that the statement attributable to them was
not actually made by them. While digital signatures may prove
to be an excellent way to obtain non-repudiation, currently private
keys are maintained in environments -- such as on hard drives
or networks which are password protected -- where they could theoretically
be expropriated with less effort than would be required to determine
them through a brute force attack on the keys themselves. Hardware
tokens, such as storing private keys on smart cards, would confirm
that the user of a private key is the party authorized to do so;
hardware tokens tied to biometric devices would provide even more
assurance.
{3.15} Merely providing authentication helps reduce fraud, at
least by permitting recourse in the event there is a problem.
Non-repudiation would further reduce fraud by preventing parties
from fraudulently denying making a statement that was made. However,
few existing systems currently completely eliminate fraud; at
most the systems reduce fraud, and uneliminated fraud becomes
part of the cost of doing business.
{3.16} Finally, the public key listed in the certificates can
be used to validate the message digest, which is a numerical representation
of the document's contents to which the digital signature is attached.
This tells the recipient of the message (and the certificate)
that the contents have not been altered; it also could permit
the sender to prove the contents of its message as sent. In both
cases, message integrity gives comfort to consumers and merchants
that the message contents can be relied upon.
Previous | Next
Back to Table of Contents
About ILPF | To Join ILPF | Working Groups & Publications
Member Resources | Events | Home