7

Example:

  • Bob generates a key pair for this example.
  • Bob registers at example dot com where he provides his public key.

  • When Bob will try to log in, example dot com will ask him to sign a random string of a few characters with his private key.

    • If the signature is successfully verified, it is indeed Bob (or Alice who stole Bob's private key, eh what can you do?) and access will be granted.

This sounds so simple. Why has this not been done before?

gxtaillon
  • 183
  • 5

1 Answers1

4

It's a chicken/egg problem.

Few people have PGP installed, so nobody builds systems which expect people to be able and willing to use it.

There are few systems which expect people to be able and willing to use PGP, so few people feel the need to install PGP.

However, what you see quite frequently in the wild are authentication systems based on X.509 certificates. It's rare for systems targeted at consumers, but for systems targeted at IT professionals it is quite common. And yes, it even works for websites.

Philipp
  • 49,384
  • 8
  • 129
  • 160