Performance

Zero Trust Arcitectire

Evidence Only Architecture

Security Principle

Mutual Suspicion → Zero Trust

Evidence sowing and verification

Authentication Logic

BAN Logic

Truth Logic

Authentication protocol

SSL (13 steps)

GAP (one step)

Authentication Method

Trust Transfer

A thing a proof

Authentication Object

To recognize foe

To recognize friend

Network Application

Back to Civil-military separation

Can realize Civil-military integration

Identifier Formation

Identifier was formed in 2021

Identifier was formed and solved in 2006

Private-key generation

Decentralized Generation, no supervision

Centralized generation, allowing supervision

Public-key generation

Generated from private-key

Computed by a Public matrix

Identifier Authentication

X

Identifier is authenticated by key

Subject Authentication

Strong Password + easy CA Certificate

Subject is proven by identifier

Dynamic Password

None

Authenticated Identifier with time

Identity Authentication

None

Ontology is proven by identifier

Slave Authentication

None

Slave is authenticated by Subject

Object Authentication

Proved by CA Certificate

Object is proved by subject

DSS Signature Standard

Only establishes trust relation

Identifier is Mapped into key

Digital Seal

X

For individual or organization

Recognizer

Friend or foe identification, Anti-counterfeit label

Access Authentication

None

Subject verification

Adopt Authentication

By certificate

Object verification

Data Encryption

DES: fixed block encryption

BLK: dynamic block encryption

Key Encryption

X

Computes other party’s public key to encrypt

Domain of keys

Unable to define

Defined clearly

Software trade mark

X

Software 1st class authorization

Single authorization trusted computing

Software Authorized by manufacturer

Software 2nd class authorization

None

Software Authorized by clients

Software 3rd class authorization

None

Software Authorized by individual

Digital currency issuance

Issued by central bank

Opened by account

Currency template

None

Issued by commercial bank

Authorization Letter

None

Authorization letter of Central bank

Currency flow

None

Payer and payee are indicated

Currency attribution

None

No vaults or purses needed

Crime of duplication

Difficult to find

Easy to find

Function

For payment

For payment and settlement