Name: Anonymous 2016-11-03 17:57
Why don't websites use public keys for authentication instead of passwords?
maybe type the password for decrypting your private key.For a normal user, this is exactly the same, except with the added hassle of having to generate some terrorist ``private key'' shit for g-d knows what reason.
authentication is too slow right now
su -c "echo UseDNS no >> /etc/ssh/sshd_config"
if you needed to prove your identity this way for every website you visitOnly for the sites that require some kind of authentication, so only sites where you have some kind of account.
but then you're constantly generating private/public keypairsJust like how every forward secrecy scheme does.
because they're usually neither big enoughSize does not affect the speed of public key cryptography in gpg. gpg only encrypts the AES key with the pub key.
in a normal HTTP connection, packets are sent often enough for this to considerably slow down browsing and there's nothing preventing you from performing DHKE.Which means that you can perform DHKE when you use gpg over http.
Just like how every forward secrecy scheme does.
Which means that you can perform DHKE when you use gpg over http.
Also, it creates a single-point of failure where if the private key is stolen - everything secured with it is stolen: passwords provides some redudancy, since each site will have different password(if the user is smart enough)
Also, it creates a single-point of failure where if the private key is stolen - everything secured with it is stolenYou can protect the key with a passphrase and can use a different key per site as well.
need to move computers and would have to copy the private key or write it down/remember itWhich is almost the same for a password. Except that for pk authentication you can use smartcards.
since each site will have different passwordIt's quite a bit impossible to have multiple strong passwords that you don't write down or don't use a password management system for it.
Most of the internet protocols are designed to be the simplest possible and obvious designthis is true for older internet protocols but not for the newer ones, especially the ones intended for security. this is not only due to security requirements but also because we don't want to replace the whole proto when one of the primitives becomes insecure - unfortunately, the complexity of those protocols can make them less secure (see: downgrade attacks)