2012-10-01, 06:57 #1Douglas BaumwallGuest
The future of online user authentication is ... graphics cards?
Last edited by JoeP517; 2012-10-01 at 08:27. Reason: removed advertising link
Get our unique weekly Newsletter with tips and techniques, how to's and critical updates on Windows 7, Windows 8, Windows XP, Firefox, Internet Explorer, Google, etc. Join our 480,000 subscribers!
+ Get this BONUS — free!
Get the most of Excel! Learn about new features, basics of creating a new spreadsheet and using the infamous Ribbon in the first chapter of Excel 2013: The Missing Manual - Subscribe and download Chapter 1 for free!
2012-10-01, 08:20 #2
- Join Date
- Mar 2004
- Manning, South Carolina
- Thanked 796 Times in 729 Posts
I wonder just what stuff these guys are smoking? Encrypt a whole disk based on physical characteristics of a grapihic card, really! What happend if/when the graphics card fails! Same for access to your financial sites. I'm just sayin'.
2012-10-01, 08:57 #3
- Join Date
- Dec 2009
- Thanked 931 Times in 852 Posts
I agree RG, not only does this seem relatively far fetched for common use, but what if I get a new PC. Now not only would I have to identify myself through the normal channels, I would somehow have to identify my "PUF"?????
2012-10-01, 10:27 #4
- Join Date
- Apr 2011
- Thanked 134 Times in 115 Posts
I think it may be possible to read too much into it just now. It's a research project. Like most research projects, the majority of data produced lead to no tangible products. Nonetheless, finding and verifying unique identifiable manufacturing differences could have a huge benefit.
Some unique identifiers rely on seemingly random data that is reproducible under certain strict conditions - encryption is one example. One doesn't need to think whole disk encryption, but what about kerberos?
I guess the point is, not that it can be done with gfx cards, but that it can be done at all. If it is possible to determine unique reproducible identifiers on a gfx card, think about secure devices, such as smartcards etc. Then extrapolate that to ATM cards, HSM modules etc...
Sure, there are algorithms for these systems just now, but having a hardware encryption system protected by keys generated by the physical construction of the hardware itself could lead to a unclonable system.
Interesting I say...In God we trust; all others must bring data.
- William Edwards Deming. 1900 - 1993