Encryption or Recognition?

13 Oct


Systems are always good tools designed and developed with good intentions.  They are designed for a purpose and as long as the conditions for which they are designed exists, it would generate a proper result.  The weakness in  systems are the conditions that is supposed to activate it; if one could override the conditions by concealing, imitating or falsifying it, the system could be made to work the way it should not.  Hackers and code breakers employ tactics that would make a system accept a condition that does or does not exist, at their will.  Recognition works differently.  When a house is burgled, the burglar has complete unmitigated access to the assets within the premises.  Access is only limited till the time the owners or neighbors recognize them as intruders, having no legitimate access. On the other hand, if the owners were in and the intruders had gained access by passing all the systems in place, the intruders would have been limited severely.

Recognition is not just saying ‘true or false’.  It is a process that concludes after ascertaining several facts.  It determines, the person, relationship, trust level, and many more factors before allowing access.  The access level of a maid differs with the access level of a child; and the access level of a plumber is far different from that of a relative or friend.  Employing the recognition method is surely far more reliable.  It is not limited by a couple or more sets of parameters.  It fulfills a range of analogous process before determining the output.  The scope and boundary are limitless, and can be easily updated and analyzed on a process to process basis.

Encryption is good in a one to one, well defined  environment.  It has paradigm limitations and the only security will be the difference between one encryption and the other.  With many products and many approaches, it will be tough to find a unified single platform that will be safe and secure.  Time and again encryption algorithms have been broken and decrypted because they have been forced to follow a standard.  Non standard products float in the sea of encryption tools, tossed and turned only to vanish, lost in their proprietary algorithms.

Makaseh Identity is a tool that would address the benefits of recognition and a single viable and secure encryption protocol for all.  makaseh.in

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: