Quote:
Thanks, but I understand what asymmetric encryption is - I'm a software engineer as well. I don't think cyclo does though.
Wrong, you just aren't listening to what I'm saying.
There has to be some sort of system to transmit the private key (stored in the database at a remote location) to the ID reader, which then uses the public key to decrypt it. This transmission - which will occur millions of times daily - opens up the Man in the Middle attack as well as other lines of attack.
There have been many in the past who claimed that their encryption was 'unbreakable,' or so complicated as to be nearly impossible to break. With the exception of the one-time pad, each and every one has been proven wrong. And I have no doubt that the method you propose is breakable as well. It behooves us to consider the history of the subject in question before making bold claims.
Ebrown, I agree that the infrastucture supporting the system is infinitely more vulnerable to attack than the actual code itself; you state:
Quote:(which presumably only the government will know).
Hell of a presumption, that, considering how hard people will be trying to get this information.
Even if the 'reader' is a full computer, it still won't be cheap - or neccessarily secure. I also believe that the virus angle is a dangerous one, as presumably the computers themselves will be networked in some fashion....
Cycloptichorn