doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Key Centric Identity Date: Authors:
doc.: IEEE / wng Submission Public Key Based Authentication November 2011 Clint Chaplin, Chair (Samsung)Slide 2 Private Key Public Key Public Keys can be openly shared Key pairs are used in an authentication exchange that proves that an entity “holds” a particular public key K 1 K 2
doc.: IEEE / wng Submission Identity Public keys are the primary authentication mechanism Why not use public keys as a primary identity? –Most identifiers require central coordination (like MAC address, DNS names, etc) –Public keys are large numbers that are by definition unique March 2012 Clint Chaplin, Chair (Samsung)Slide 3
doc.: IEEE / wng Submission Access Control with Public Keys as Identity November 2011 Clint Chaplin, Chair (Samsung)Slide 4 Can K 1 enter network? K 1 K 2 Access control servers do NOT need to hold any secrets
doc.: IEEE / wng Submission Hashing Public Keys Public keys can be large Hashing can be used to create a smaller and still unique identifier March 2012 Clint Chaplin, Chair (Samsung)Slide 5
doc.: IEEE / wng Submission Hashing Keys to Form Addresses Public keys can even be used as an address using a hash March 2012 Clint Chaplin, Chair (Samsung)Slide 6 46 bits of hash(K 1, Ni)