outsourcing phone based web authentication while
play

Outsourcing Phone-based Web Authentication while Protecting User - PowerPoint PPT Presentation

Outsourcing Phone-based Web Authentication while Protecting User Privacy NordSec 2016 Martin Potthast 1 Christian Forler 2 Eik List 1 Stefan Lucks 1 1 Bauhaus-Universitt Weimar <firstname>.<lastname>(at)uni-weimar.de 2 Beuth


  1. Outsourcing Phone-based Web Authentication while Protecting User Privacy NordSec 2016 Martin Potthast 1 Christian Forler 2 Eik List 1 Stefan Lucks 1 1 Bauhaus-Universität Weimar <firstname>.<lastname>(at)uni-weimar.de 2 Beuth Hochschule für Technik Berlin 04 Nov 2016 Outsourcing Phone-based Web Authentication 04 Nov 2016 1/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  2. Section 1 Motivation Outsourcing Phone-based Web Authentication 04 Nov 2016 2/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  3. Passwords Humans are bad at memorizing strong passwords Already 2007: Median user is registered at 25 web services [Florêncio and Herley, 2007] Passwords are unlikely to disappear in the near future Image: xato.net Outsourcing Phone-based Web Authentication 04 Nov 2016 3/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  4. Two-Factor Authentication 1st Factor 2nd Line of Defense against 2nd Factor Reused passwords Account or Personal Data Weak credentials or lacking 1st-factor policies Data breaches Phishing attacks . . . Image: https://www.google.com/landing/2step Outsourcing Phone-based Web Authentication 04 Nov 2016 4/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  5. Two-Factor Authentication Factors Something you know Unique tuple of username + password Idea: Duo Mobile 2014; Images: http://2.bp.blogspot.com/-3wBHxiz30Do/VEU8Ba4j7BI/AAAAAAAABo4/-gs07aNu7lA/s1600/homer-idea.png , https://frinkiac.com/caption/S06E02/42976 , http://s1.favim.com/orig/14/eye-homer-homer-simpson-simpson-simpsons-Favim.com-184669.jpg , https://upload.wikimedia.org/wikipedia/en/0/0b/Marge_Simpson.png Outsourcing Phone-based Web Authentication 04 Nov 2016 5/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  6. Two-Factor Authentication Factors Something you know Unique tuple of username + password Something you have Personal device or smartphone app Idea: Duo Mobile 2014; Images: http://2.bp.blogspot.com/-3wBHxiz30Do/VEU8Ba4j7BI/AAAAAAAABo4/-gs07aNu7lA/s1600/homer-idea.png , https://frinkiac.com/caption/S06E02/42976 , http://s1.favim.com/orig/14/eye-homer-homer-simpson-simpson-simpsons-Favim.com-184669.jpg , https://upload.wikimedia.org/wikipedia/en/0/0b/Marge_Simpson.png Outsourcing Phone-based Web Authentication 04 Nov 2016 5/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  7. Two-Factor Authentication Factors Something you know Unique tuple of username + password Something you have Personal device or smartphone app Something you are Fingerprint or retina scan Idea: Duo Mobile 2014; Images: http://2.bp.blogspot.com/-3wBHxiz30Do/VEU8Ba4j7BI/AAAAAAAABo4/-gs07aNu7lA/s1600/homer-idea.png , https://frinkiac.com/caption/S06E02/42976 , http://s1.favim.com/orig/14/eye-homer-homer-simpson-simpson-simpsons-Favim.com-184669.jpg , https://upload.wikimedia.org/wikipedia/en/0/0b/Marge_Simpson.png Outsourcing Phone-based Web Authentication 04 Nov 2016 5/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  8. Two-Factor Authentication Factors Something you know Unique tuple of username + password Something you have Personal device or smartphone app Something you are Fingerprint or retina scan Someone you know [Brainard et al., 2006] Idea: Duo Mobile 2014; Images: http://2.bp.blogspot.com/-3wBHxiz30Do/VEU8Ba4j7BI/AAAAAAAABo4/-gs07aNu7lA/s1600/homer-idea.png , https://frinkiac.com/caption/S06E02/42976 , http://s1.favim.com/orig/14/eye-homer-homer-simpson-simpson-simpsons-Favim.com-184669.jpg , https://upload.wikimedia.org/wikipedia/en/0/0b/Marge_Simpson.png Outsourcing Phone-based Web Authentication 04 Nov 2016 5/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  9. Phone-based Two-factor Authentication Benefits: Omnipresent, ubiquitous Spares users from carrying around additional devices Spares service providers from shipping devices Outsourcing Phone-based Web Authentication 04 Nov 2016 6/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  10. Phone-based Two-factor Authentication Benefits: Omnipresent, ubiquitous Spares users from carrying around additional devices Spares service providers from shipping devices Disadvantage: Difficult to implement from scratch = ⇒ outsourcing Outsourcing Phone-based Web Authentication 04 Nov 2016 6/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  11. Phone-based Two-factor Authentication Benefits: Omnipresent, ubiquitous Spares users from carrying around additional devices Spares service providers from shipping devices Disadvantage: Difficult to implement from scratch = ⇒ outsourcing Privacy? An honest-but-curious authentication provider potentially learns Usage statistics of users Usage statistics of service providers Relations of users to service providers Outsourcing Phone-based Web Authentication 04 Nov 2016 6/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  12. Phone-based Two-factor Authentication Benefits: Omnipresent, ubiquitous Spares users from carrying around additional devices Spares service providers from shipping devices Disadvantage: Difficult to implement from scratch = ⇒ outsourcing Privacy? An honest-but-curious authentication provider potentially learns Usage statistics of users Usage statistics of service providers Relations of users to service providers Goal of Passphone: Phone-based two-factor authentication scheme Outsource verification of 2nd factor while preserving privacy Outsourcing Phone-based Web Authentication 04 Nov 2016 6/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  13. Existing Phone-Based Two-Factor Authentication Schemes Time-based One-Time Passwords: Google 2-Step [Google, 2013] , Microsoft [Meisner, 2013] , Apple [Apple, 2016] , Facebook [Song, 2011] Cronto [VASCO, 2013] , Duo Mobile [Duo Security, 2016] Academia: SoundProof [Karapanos et al., 2015] : Avoided need for user interaction Shirvanian et al. [Shirvanian et al., 2014] : Resilience to off-line attacks PhoneAuth [Czeskis et al., 2012] MP-Auth [Mannan and van Oorschot, 2011] : No secret on device Tiqr [Van Rijswijk and Van Dijk, 2011] , Snap2Pass [Dodson et al., 2010] , QR-TAN [Starnberger et al., 2009] : QR-based PhoolProof [Parno et al., 2006] : Bookmark-based Outsourcing Phone-based Web Authentication 04 Nov 2016 7/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  14. Remarks Privacy-unaware users may be tracked down by other means: Users must avoid reuse or self-related credentials and mail addresses Users should hide their identity (e. g., use services like TOR) Base on TLS-secured connections Recommendations: Public-key pinning for Trusted Third Party Bind TLS connections to specific channel Goal: No additional angles for user profiling by second factor Outsourcing Phone-based Web Authentication 04 Nov 2016 8/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  15. Section 2 Passphone Protocols Outsourcing Phone-based Web Authentication 04 Nov 2016 9/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  16. Involved Parties T S Service provider Trusted Third T Party P User (prover) Prover’s telephone PT P S Prover’s mail box PM Outsourcing Phone-based Web Authentication 04 Nov 2016 10/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  17. Involved Parties T S Service provider Trusted Third T Party P User (prover) Prover’s telephone PT P S Prover’s mail box PM Assume: User has device PT and mail box PM under control Assume: TTP is honest (but curious) Encode protocol, step, version, and sender information in all messages Protocols: Registration, Activation, Authentication, Revocation, Rekeying Outsourcing Phone-based Web Authentication 04 Nov 2016 10/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  18. Passphone : Registration P ’s device PT generates and stores a key pair K public , K secret PT PT P T S Service provider ID X ID of X ( · ) X Signed by X Trusted Third Party Blinded ID of X E K �·� TLS-protected T h X P User (prover) Challenge of X N X Outsourcing Phone-based Web Authentication 04 Nov 2016 11/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  19. Passphone : Registration P submits public key and a blinded ID h PT = Hash ( N PT ) to T � � K public (1) E K , ID P M , h P T P T P T S Service provider ID X ID of X ( · ) X Signed by X T Trusted Third Party h X Blinded ID of X E K �·� TLS-protected P User (prover) N X Challenge of X Outsourcing Phone-based Web Authentication 04 Nov 2016 11/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  20. Passphone : Registration T sends challenge N T to P ’s mail account � � K public (1) E K , ID P M , h P T P T (2) X := ( N T ) T P T S Service provider ID X ID of X ( · ) X Signed by X T Trusted Third Party h X Blinded ID of X E K �·� TLS-protected P User (prover) N X Challenge of X Outsourcing Phone-based Web Authentication 04 Nov 2016 11/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  21. Passphone : Registration P forwards challenge to PT � � K public (1) E K , ID P M , h P T P T (2) X := ( N T ) T (3) X P T S Service provider ID X ID of X ( · ) X Signed by X T Trusted Third Party h X Blinded ID of X E K �·� TLS-protected P User (prover) N X Challenge of X Outsourcing Phone-based Web Authentication 04 Nov 2016 11/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

Recommend


More recommend