On Constructing a Trusted Path to the User

TitleOn Constructing a Trusted Path to the User
Publication TypeTechnical Report
Year of Publication2009
AuthorsWeaver, N., & Allman M.
Other Numbers2790
Abstract

One of the fundamental activities within a network is authentication. Current schemes fail for a number of reasons, but crucially they are almost all vulnerable to end-host compromise and an inability to authenticate transactions. In this preliminary report we argue that a generic trusted path to the user is an essential building block for the future Internet architecture. We sketch the design of a "key fob" that will readily fit on peoples' physical key rings and provide such a trusted path from Internet services to users regardless of the state of the components of that path.

URLhttp://www.icsi.berkeley.edu/pubs/techreports/TR-09-009.pdf
Bibliographic Notes

ICSI Technical Report TR-09-009

Abbreviated Authors

N. Weaver and M. Allman

ICSI Research Group

Networking and Security

ICSI Publication Type

Technical Report