let s authenticate
play

Lets Authenticate Automated Cryptographic Authentication for the - PowerPoint PPT Presentation

Lets Authenticate Automated Cryptographic Authentication for the Web with Simple Account Recovery James Conners Daniel Zappala Brigham Young University Our focus easy registration/login easy account recovery privacy by design What about


  1. Let’s Authenticate Automated Cryptographic Authentication for the Web with Simple Account Recovery James Conners Daniel Zappala Brigham Young University

  2. Our focus easy registration/login easy account recovery privacy by design

  3. What about WebAuthn? Registration/Login Recovery Privacy

  4. Alice wants to register to Facebook

  5. Username One-Time Challenge Key, UID, Relying Party info

  6. JavaScript Client

  7. User Consent User Consent

  8. Alice wants to register to Amazon

  9. Username One-Time Challenge Key, UID, Relying Party info

  10. JavaScript Client

  11. User Consent User Consent

  12. Potential for authenticator bloat

  13. What happens if Alice loses her authenticator?

  14. Alice wants to recover her Amazon account

  15. Alice needs to register a 2nd authenticator with Amazon

  16. Username One-Time Challenge Key, UID, Relying Party info

  17. JavaScript Client

  18. User Consent User Consent

  19. Privacy leaks and Tracking are possible

  20. Let’s Authenticate Easy Registration/Login Easy account recovery Privacy

  21. Let’s Authenticate Registration/Login

  22. Username/Password

  23. Scan/click the QR code User gives consent

  24. Case 1 Let’s Authenticate Server App sends CSR Returns signed cert App forwards cert to destination Facebook Cryptographic proofs

  25. Case 2 Facebook App forwards cert to destination Cryptographic proofs

  26. Scan/click the QR code User gives consent

  27. Let’s Authenticate Server App sends CSR Returns signed cert App forwards cert to destination Amazon Cryptographic proofs

  28. What happens if Alice loses her authenticator?

  29. Username/Password

  30. Let’s Authenticate Username/Password Returns all certificates

  31. Scan/click the QR code User gives consent

  32. Privacy • Want to avoid colluding websites tracking users • Want to avoid giving Let’s Auth CA information about sites a user authenticates to

  33. Privacy • Each certificate is bound to a unique email address: <uniquecode>@letsauth.org • <uniquecode> = hash(username,password,websiteDomain,salt) • Also makes it easy to reclaim accounts after lost authenticator

  34. Comparing Let’s Authenticate to WebAuthn

  35. What’s Next? • In-depth Security and privacy analysis • In lab and longitudinal user studies • Exploration of different account challenges • Consideration of short-lived certificates VS revocation

  36. Discussion

  37. Persona • Allowed email providers to issue certificates to a user • Simpler registration process since their email was verified • Tracking still possible, unless a user creates a different email for each service • Adoption was an issue as well 4 entities of adoption (Users, Websites, Browsers and Email providers) • • They did provide a fallback identity provider and a cross-browser library, but they were short term solutions

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend