Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Why Asymmetric cryptography in ID applications?

0
Posted

Why Asymmetric cryptography in ID applications?

0

All the major ID applications (ID cards, signature application, passport…) do rely on asymmetric cryptography. The symmetric cryptography can not be envisioned for these large scale usages. First of all, it requires an a priori unique identification of the card. As the use of contactless cards is getting more and more fashionable, it can not be envisioned as it would enable any attacker to uniquely identify a card holder by scanning a crowd. Moreover, the eService willing to communicate needs to possess the symmetric key to use. It may either request the services of on online HSM, which would provide all the cryptographic services needed to communicate with the microchip, or use the keys it stores in a secure storage area. It requires either a permanent online link to a cryptographic services provider and/or the diffusion of the cryptographic keys to all the e-Services. It mandates either a very constraining infrastructure design or, in the second case, introduces a major treat in th

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123