What is DID-Auth and how does it work?

Sethi Saab
2 min readJun 26, 2019

DID-Authentication is the process of authenticating a DID.

It works on the concept of DID -auth challenge.

Suppose there are 2 parties who want to connect and communicate

DID owner and a Relying party.

Now the user wants to access amazon.com to buy some stuff.

Amazon.com provides a functionality, say a QR code is there which you need to scan to get access to amazon.com

When you will scan the QR code provided Amazon will ask you to authenticate yourself first before you access their portal.

Workflow

This QR code is basically a random challenge that the Owner did has to solve.

So when Owner receives cryptographic challenge it responds to the challenge by using its private key. Say owner receives a challenge message “LOL”

Now Owner will respond to the challenge by using its private key to encrypt the “LOL” and then encrypt it again using amazon.com’s public key.

Now when Amazon will receive the challenge, first it decrypts the challenge by using its private key and then decrypt it again using the owner’s Public key.

How will Amazon get the owner DID’s public key?

Amazon will look for the DID document using the owner’s DID using DID resolver and get the public key from that DID document.

If Amazon gets the same result “LOL”. It will allow or authenticate the user to access the amazon.com portal.

and if it doesn’t get the correct message after decryption. It will refuse the person to access its portal.

— — — — — — — — — — — — — END — — — — — — — — — — — — — — —

Email ID: sethi.shivam27@gmail.com

--

--