Thirteen Reasons to

Say 'No' to Public Key Cryptography

Draft paper, March 4th, 1998

by Thierry Moreau

© 1998 CONNOTECH Experts-conseils, Inc.


Table of contents

Introduction
The Global System View
. . . . 1. The "Public Key Infrastructure" Requirement
. . . . 2. Liability Issues
. . . . 3. Distribution of (CRL) Certificate Revocation List
. . . . 4. The "Power of the Installed Base" Effect
The Education Challenge
. . . . 5. End-user Education
. . . . 6. Education Issue for IT Professionals
. . . . 7. Criticalness of the Education Challenge
Patent and "National Security" Issues
. . . . 8. Patent Issues.
. . . . 9. "National Security" Issues
Outstanding Technical Issues
. . . . 10. Secure Storage of Secret Keys.
. . . . 11. Extremely Compute-Intensive Algorithms
Inherent Vulnerabilities of PKC Techniques
. . . . 12. Attacks on Key Management
. . . . 13. Subtle Failure Scenarios
. . . . 14. Fear of a Global System Collapse?

Introduction

This document records observations on challenging aspects of a "breakthrough" technology in the field of information security, called "public key cryptography" (PKC). This document does not contain a tutorial on the relevant concepts. Furthermore, because it records observations on diversified perspectives, from digital systems architecture to regulatory issues, no single reader profile is assumed. The author personally went through the entrepreneurial process of 1) discovering and studying this breakthrough technology, 2) applying it to the development of an application, that is electronic payments by fax, for a niche market, that is, business-to-business payments in the Canada and the US, and 3) crusading in the marketplace against innovation adoption inertia. The observations recorded here were learnt mainly through this experience. At the time of writing this document, the author promotes a by-product of his previous R&D activities, a cryptographic key management procedure called SAKEM, which is indeed an alternate strategy between the classical usage of secret-key cryptography and the complete adoption of PKC.

Realistically, no conclusion is easily drawn from the assortment of observations reported here. In any given application of PKC, some observations will be more relevant than others.

The Global System View

The Education Challenge

Patent and "National Security" Issues

Outstanding Technical Issues

Inherent Vulnerabilities of PKC Techniques


security scheme designalternative to PKIpatent publicationsSAKEMscholarly web contentsconsulting services ]
[ CONNOTECH home page: http://www.connotech.com/about us | e-mail to: info@connotech.com ]

CONNOTECH Experts-conseils Inc.
9130 Place de Montgolfier
Montréal, Québec, Canada, H2M 2A1
Tél.: +1-514-385-5691 Fax: +1-514-385-5900