Misplaced Pages

Petname

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
This article is about the security-enhancing software naming systems. For the shorter or diminutive form of a word or given name, see Hypocorism. For names of pet animals, see Personal name § Non-human personal names.

Petname systems are naming systems that claim to possess all three naming properties of Zooko's triangle - global, secure, and memorable. Software that uses such a system can satisfy all three requirements. Such systems can be used to enhance security, such as preventing phishing attacks. Unlike traditional identity systems, which focus on the service provider, Petname systems are decentralized and designed to facilitate the needs of the enduser as they interact with multiple services.

History

Though the Petname model was formally described in 2005 by Mark Stiegler, the potential of the system was discovered by several people successively.

Examples

  • The GNU Name System (GNS) – a decentralized alternative to DNS based on the principle of a petname system
  • CapDesk – a distributed desktop environment
  • Petname Tool (discontinued browser extension) – There was a browser extension available for Firefox called Petname Tool that allowed pet names to be assigned to secure websites. Use of this extension could help prevent phishing attacks.

PetName Markup Language

The PetName Markup Language (PNML) is a proposal for embedding Petname information into other systems using a custom markup language.

PNML consists of two tags:

  • <pn>pet-name-string</pn>
  • <key>stringified-cryptographic-key</key>

References

  1. "An Introduction to Petname Systems".
  2. Sadek Ferdous; Audun Jøsang; Kuldeep Singh; Ravishankar Borgaonkar (2009). Security Usability of Petname Systems. Lecture Notes in Computer Science. Springer Science+Business Media. ISBN 9783642047657.
  3. ^ Audun Jøsang; Torleiv Maseng; Svein J. Knapskog (29 September 2009). Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings. Springer Science & Business Media. pp. 1–. ISBN 978-3-642-04765-7.
  4. ^ "The PetName Markup Language".
  5. Schanzenbach, Martin; Grothoff, Christian; B., Fix (2022-02-03). "The GNU Name System". GNUnet. IETF. Retrieved 2022-02-04. The design of GNS incorporates the capability to integrate and coexist with DNS. GNS is based on the principle of a petname system and builds on ideas from the Simple Distributed Security Infrastructure .
  6. "E and CapDesk".
  7. Markus Jakobsson; Steven Myers (2006). Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience. ISBN 0471782459.

External links

Object-capability security
Concepts
Operating systems, kernels
Programming languages
File systems
Specialised hardware


Stub icon

This cryptography-related article is a stub. You can help Misplaced Pages by expanding it.

Stub icon

This free and open-source software article is a stub. You can help Misplaced Pages by expanding it.

Categories: