THE STATE OF AUTHENTICATION Chad Spensky Allthenticate
OUTLINE • Who am I? • Authentication overview • Current state of Authentication • The future of authentication
MY JOURNEY 2012-2015 2004-2011 2015-Present 1998-2004 Staff at MIT LL Internet Pirate Offensive Security Console Modder B.S. in CS & Math Ph.D. CS (Security) M.S. in CS (Authentication) Founder of Allthenticate
THE PROBLEM Everyone should not have access to everything.
AUTHENTICATION Only permitting authorized users to access a resource Chad
AUTHENTICATION Real World Digital World
AUTHENTICATION • What you know • What you have • What you are
PASSWORDS More than 15 usernames More than 150 saved passwords cspensky@ucsb.edu ******* Dedicated apps ******* ******* ******* cspensky@gmail.com ******* ******* ******* ******* ******* cspensky@mit.edu ******* ******* ******* ******* ******* ******* ******* ******* chad@allthenticate.net ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* cspensky@cs.ucsb.edu ******* ******* ******* ******* ******* ******* ******* chad@cspensky.info ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* cspensky@unc.edu ******* ******* ******* ******* ******* ******* ******* ******* ******* cspensky@alumni.pitt.edu ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* chad.spensky@ll.mit.edu ******* ******* ******* ******* ******* ******* cspensky@comcast.net ******* ******* ******* ******* ******* cspensky@alumni.unc.edu ******* ******* Today
HARDWARE TOKENS Smartphone Second Factor Hardware Credential Portable Computer Employee
BIOMETRICS Fingerprint Voice Recognition FaceID
AUTHENTICATION IMPLEMENTATIONS
HOW PASSWORDS WORK Chad1 Chad1 Secure Hash Function Chad1 ac18753fe31 Encrypted Tunnel Keyboard Entry Hash saved
HOW PASSWORDS FAIL Chad1 Chad1 Secure Hash Function Chad1 ac18753fe31 Encrypted Tunnel Keyboard Entry Hash saved
https://xkcd.com/538/
HOW 2FA WORKS Chad1 Chad1 Secure Hash Function 1234 Chad1 ac18753fe31 1234 1234
HOW 2FA FAILS Chad1 Chad1 Secure Hash Function 1234 Chad1 ac18753fe31 1234 1234
HOW 2FA WORKS (BETTER SOLUTION) Chad1 Secure Hash Function Chad1 ac18753fe31 Challenge Response
https://www.techspot.com/news/78292-new-reverse-proxy-tool-posted-github-can-easily.html
HOW TOKENS WORK Request Token Required Challenge Response
HOW TOKENS FAIL Request Token Required Challenge Response
https://nakedsecurity.sophos.com/2019/06/17/yubico-recalls-fips-yubikey-tokens-after-flaw-found/
HOW BIOMETRICS WORK Request Biometric Required Challenge Do X? Signed Response Yes
HOW BIOMETRICS WORK Request Biometric Required Challenge Do X? Signed Response Yes
http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm
SECURITY VS USABILITY VS COST
FINDING THE RIGHT FIT Value of Asset Security
FINDING THE RIGHT FIT User Burden Security
FINDING THE RIGHT FIT ******* User Burden Security
FINDING THE RIGHT FIT Implementation Cost Security
FINDING THE RIGHT FIT Implementation Cost ******* Security
THE PROBLEM There are too many options
WE NEED FLEXIBILITY
WE NEED FLEXIBILITY *******
MORE SECURITY. LESS BURDEN. chad@allthenticate.net www.allthenticate.net
Recommend
More recommend