Secure authentication of Sender and Receiver of data.

For discussions about security.
Post Reply
Message
Author
nooby
Posts: 10369
Joined: Sun 29 Jun 2008, 19:05
Location: SwedenEurope

Secure authentication of Sender and Receiver of data.

#1 Post by nooby »

This is not a spam. I don't give link to the company
I make you aware of their solution and ask if you get
if it is secure or not.

The woman innovator has worked on it for 8 years
and she have been granted patents in several countries.

She describe ho wit works on her companies home page.
http://www.kelisec.com/index.php/method
I. A initiates a session by connecting to the access server (AS).
The server then authenticates A.

If A is a Kelisec member the AS initiates communication with B
which also will be authenticated in a similar process.

Each node has a unique DNA. The two unique elements are blended
in the AS. The blended DNA is irreversible. A secure session
has been established.
read the rest of the explanation using the link.

Now the good thing is secure authentication that the Sender of data
is the one they pretend to be :) Same with receiver both has to
do the authentication.

Now the very bad thing is that none will be able to be anonymous
anymore if this is by law implemented on ISP level.

Each computer has to have this feature for to be sold and used.
Each motherboard.

Sure this is my pessimistic view on the kind of society
we are heading towards. A total "1984" kind of absolute
knowledge on every thing the user of computers and smartphones
do online. Whom you are and whom you contact and where you
where when contact got established. What page on internet you
look on and download and so on.

Sure the good thing is they hopefully catch some Robber that
exchange plans with his buddies or a some other mean spirited
action someone want to take.

But the bad effect can be total knowledge of each individual

We will have no freedom to disagree anymore.
I use Google Search on Puppy Forum
not an ideal solution though

User avatar
Barkin
Posts: 803
Joined: Fri 12 Aug 2011, 04:55

Re: Secure authentication of Sender and Receiver of data.

#2 Post by Barkin »

nooby wrote:I make you aware of their solution and ask if you get if it is secure or not.

http://www.kelisec.com/index.php/method

read the rest of the explanation using the link.
That looks more like an attempt to evade big-brother's eavesdropping , rather than to enforce it.

That "A" and "B" communicating via an intermediary, the access server, who encrypts their messages differently,
(see attachment), then I think that avoids a "Man-in-the-middle attack", which is possible withpublic-key cryptography.


Their method looks somewhat similar to TOR but just with one layer and all links encrypted.

Image
Attachments
koppling.png
http://www.kelisec.com/index.php/method
(16.68 KiB) Downloaded 251 times

nooby
Posts: 10369
Joined: Sun 29 Jun 2008, 19:05
Location: SwedenEurope

#3 Post by nooby »

Cool thanks for explaining. She is on to something good maybe.
Future will tell.
I use Google Search on Puppy Forum
not an ideal solution though

Post Reply