{"id":4468,"date":"2022-03-05T20:54:30","date_gmt":"2022-03-05T20:54:30","guid":{"rendered":"http:\/\/smart.onlinesarafi.com\/index.php\/2022\/03\/05\/remme-whitepaper\/"},"modified":"2022-03-05T20:54:30","modified_gmt":"2022-03-05T20:54:30","slug":"remme-whitepaper","status":"publish","type":"post","link":"https:\/\/smart.onlinesarafi.com\/index.php\/2022\/03\/05\/remme-whitepaper\/","title":{"rendered":"Remme Whitepaper"},"content":{"rendered":"<div readability=\"141.39441176471\">\n<p>Abstract<\/p>\n<p>Nowadays, the main method of accessing various local and network resources is a<br \/>password, that has proven itself as a way of identifying and securing users and<br \/>resources. However, it has one serious drawback: in case of stealing a password,<br \/>an attacker gets access to all the data of the user who owned this password. In<br \/>addition, users usually have the same password for multiple services, the situation<br \/>gets even worse because these passwords can be weak or even be a subject for<br \/>vocabulary attack. Password databases from a variety of resources periodically fall<br \/>into open access. In general, even if the resource provides the ability to change<br \/>the password, this method is somewhat vulnerable, since the user\u2019s mailboxes are<br \/>usually protected by a password, often the same as that used on other resources.<br \/>Thus, the password can not serve as a sufficient instrument for protecting user data<br \/>and guarantee the security of the user session.<\/p>\n<p>An approach to this problem is password managers. This software, which provides<br \/>a secure storage for passwords, and, in the case of integration as a browser<br \/>extension, is able to withstand numerous ways of stealing passwords. Also,<br \/>password managers are often able to generate secure passwords that are unique<br \/>to each resource, which takes security to a new level. The obvious drawback of<br \/>such protection is that the storage is protected with a master password (Lastpass,<br \/>1Password), and in case of theft or brute force the master password, it all boils<br \/>down to the previous thesis.<\/p>\n<p>Two-factor authentication provides a partial solution of password problems. For<br \/>two-factor authentication, in addition to the password, it is required to provide the<br \/>resource with some more data that should be available only to a particular user.<br \/>Examples of the second factor:<br \/>1) One-time passwords that are generated every n seconds are the most<br \/>common option. Usually implemented with TOTP protocol.<br \/>2) One-time passwords sent in the message. Usually, SMS or instant<br \/>messengers is used.<br \/>3) Hardware tokens.<\/p>\n<p>Another way of authorizing a user into the system is SSL\/TLS certificates, which are<br \/>widely adopted in enterprise solutions, such as banking, tax services, etc.<br \/>A system of Public Key Infrastructure supports the creation, distribution and<br \/>identification of public encryption keys, enabling users and systems to both<br \/>securely exchange data over untrusted environment such as the Internet as well as<br \/>verify the identity of the other party of conversation. PKI provides possibilities for<br \/>digital signature (confirmation of authentication, non-repudiation and message<br \/>integrity), data encryption (confidentiality during data storing, transfer and<br \/>processing) and authorization in one complex system.<\/p>\n<p>The core of PKI \u2013 the public key encryption systems (a private key for encryption, a<br \/>public key for decryption) based on strong mathematical approaches. But simple<br \/>presence of public\/private key is not enough for trust. There should be a complex<br \/>and comprehensive system with all functions listed above.<\/p>\n<p>Typically PKI consists of a lot of controls beginning from policies and standards<br \/>through administration and management to software and hardware. PKI can be<br \/>realized in different architectures: simple, network, hierarchy etc. But we should<br \/>understand that the heart of PKI is digital certificates. A digital certificate is a<br \/>document designed to affirm the identity (user, system etc.) of the certificate<br \/>subject and bind that identity to the public key contained in the certificate.<\/p>\n<p>The typical scheme of PKI includes next elements:<br \/>\u2022 Certification Authority (CA) \u2013 a trusted party provides services for issue<br \/>digital certificates.<br \/>\u2022 Registration Authority (RA) \u2013 a trusted party responsible for accepting<br \/>requests for digital certificates and authenticating the entity making the<br \/>request. Sometimes RA also called subordinate CA.<br \/>\u2022 Validation Authority (VA) \u2013 a trusted party provides a service used to verify<br \/>the validity of a digital certificate. It\u2019s clear that different VA should has<br \/>database of valid certificates, revoked certificates and communication with<br \/>different CA.<\/p>\n<p>As we can see, functioning of PKI based on trusted authorities with different<br \/>functions.<\/p>\n<p>From our point of view we should focus on several core issues. First of all, PKI now<br \/>is government regulated or business driven ecosystem depends on a sector of<br \/>application. Government CA and PKI at all usually are not acceptable for wide<br \/>public or SMB use according to different limitations and application lockin. For<br \/>example, specific CA works with specific tax reporting software. Services of<br \/>business CA very often expensive and there is a collusion between software<br \/>vendors and CA for including specific CA into a list of trusted for this software. For<br \/>example, web browsers don\u2019t accept all certificates issued by different CA.<br \/>Sometimes ago it was a brilliant vision named \u201cweb of trust\u201d were most of noted<br \/>problems could be resolved with teamwork of count of CA\/VA\/RA. Unfortunately,<br \/>it left just as vision according to the disagreement s CA to work in a single network<br \/>of trust.<\/p>\n<p>Our team works on solving those problems by implementing decentralized<br \/>public key infrastructure based on blockchain technology. The chosen<br \/>approach will give our end customers the way of managing their PKI with a high<br \/>level of security and all advantages of decentralized and distributed system,<br \/>including fault tolerance.<\/p>\n<p>Advantages of REMME:<br \/>1. There is no centralized database of certificates and keys that could be<br \/>compromised.<br \/>2. There are no technology lockin and API limitations. Easy integration with<br \/>existing systems.<br \/>3. There are no additional fees for different certificates\/credentials in<br \/>different CA.<br \/>4. There are no possibilities for collusion between software\/hardware<br \/>vendors and limited count of CAs.<br \/>5. Fast and protected public key distribution process.<br \/>6. Fast and protected certificate revocation process.<br \/>7. Single point of trust for different systems: easy single-sign-on<br \/>implementation, decentralized worldwide available authorization.<br \/>8. There are no legal limitations and government cooperation issues.<br \/>Additional advantages:<br \/>1. Acceptable for different types multi-factor authentication.<br \/>2. Full anonymity.<br \/>3. It allows to track all issued certificates, provides complete and<br \/>transparent control.<\/p>\n<p>REMME is bringing blockchain to PKI infrastructure providing immutability of<br \/>data stored there.<\/p>\n<p>For simple user it could look complicated, but all is simple: you don\u2019t need to<br \/>remember count of login and passwords, you don\u2019t need to pay five or ten<br \/>authorities for certificates used in tax, legal, bank, technical or other types of<br \/>software, you don\u2019t need to control the live time of each password\/certificate\/key.<\/p>\n<p> <a href=\"https:\/\/remme.io\/\" target='_blank\"' rel=\"noopener\"> Remme Website<\/a> <br \/><a href=\"https:\/\/drive.google.com\/file\/d\/0B1jTRGmj_3khUV9RTERnYzNvaE0\/view\" target='_blank\"' rel=\"noopener\"> Remme Whitepaper <\/a> <strong><\/strong><\/p>\n<p>Social<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Abstract Nowadays, the main method of accessing various local and network resources is apassword, that has proven itself as a way of identifying and securing users andresources. However, it has one serious drawback: in case of stealing a password,an attacker gets access to all the data of the user who owned this password. Inaddition, users [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4468","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/posts\/4468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/comments?post=4468"}],"version-history":[{"count":1,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/posts\/4468\/revisions"}],"predecessor-version":[{"id":4469,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/posts\/4468\/revisions\/4469"}],"wp:attachment":[{"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/media?parent=4468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/categories?post=4468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smart.onlinesarafi.com\/index.php\/wp-json\/wp\/v2\/tags?post=4468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}