Understanding Privacy
F
or more than a decade, businesses, governments,
universities, and other organizations have devel-
oped and deployed identification–authentication
systems based on public-key infrastructure (PKI).
But despite this strong institutional support, an alternative
system for identification and authentication organically
evolved, improved, and spread during recent years. This
identification–authentication regime is not based on
public-key cryptography, but instead on the ability to re-
ceive email sent to a particular address.
In this article, I argue that despite some security short-
comings, email-based identification and authentication
(EBIA) is a reasonable approach for many current com-
mercial and government applications. EBIA provides a
better match to the usability, privacy, autonomy, resiliency,
and real-world business requirements than PKI technol-
ogy. Today, even sensitive applications that let us enter into
binding business agreements worth thousands of dollars
(for example, on eBay) and electronically transfer money
between bank accounts (for example, with PayPal), use
EBIA. Here, I analyze its advantages and weaknesses, dis-
cuss best practices for its continued use, and show how
EBIA might evolve into a system with stronger security
properties. The “Related work” textbox on page 24 de-
scribes other PKI alternatives in progress.
Identifiers and identity theft
Personal identifiers typically are names, symbols, or codes
that represent a human being. Identifiers can be contextu-
ally or globally unique: There is only one George Bush
who lives at 1600 Pennsylvania Avenue in Washington,
D.C., but there are two people named George Bush in the
New York City telephone directory and another 15 else-
where in New
York state.
Sometimes different people can use the same identi-
fier—a family can share a telephone number, for example.
Other applications require singularly unique identifiers.
In 1936, the Social Security Board adopted the nine-digit
social security number (SSN) system to track the earnings
of different Americans with the same names. The 1935
Social Security Act required tracking each American’s
earnings through his or her employment lifetime because
it based, in part, retirement benefits on lifetime earnings
(see “The History of Social Security;” www.ssa.gov/
history/). Thus, while two people living today in New
York City have the George Bush name, each of them
should have a unique SSN. Moreover, those numbers
should be different from that of the George Bush living on
Pennsylvania Avenue in Washington, D.C., and every
other person cataloged in the social security system.
Universal identifiers, which the SSN has become, are
identifiers used simultaneously by different organizations.
But not all universal identifiers were designed with this
purpose in mind. The SSN evolved into a universal iden-
tifier as various government agencies began to use it in
preference to numbers that they could issue. It was
cheaper for the federal government to use pre-existing
SSNs as military serial numbers, then as federal employee
numbers, and, finally, as taxpayer identification numbers,
than it was for all other bureaucracies to develop and
maintain their own identification regimes.
But the SSN is a poor universal identifier. It lacks secu-
rity features such as a check digit (to detect typographical
errors) and a large space of unused codes (to decrease the
likelihood that a randomly-chosen number matches a real
SIMSON L.
GARFINKEL
Massachusetts
Institute of
Technology
Email-Based Identification
and Authentication: An
Alternative to PKI?
20 PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/03/$17.00 © 2003 IEEE ■ IEEE SECURITY & PRIVACY
Email-based identification and authentication is an emerg-
ing alternative to public-key infrastructure. It overcomes
many problems inherent with traditional authentication
techniques, such as social security numbers, and provides
functional security when used within a limited context.