outsourcing phone based web authentication while
play

Outsourcing Phone-based Web Authentication while Protecting User - PowerPoint PPT Presentation

Outsourcing Phone-based Web Authentication while Protecting User Privacy NordSec 2016 Martin Potthast 1 Christian Forler 2 Eik List 1 Stefan Lucks 1 1 Bauhaus-Universitt Weimar <firstname>.<lastname>(at)uni-weimar.de 2 Beuth


  1. Outsourcing Phone-based Web Authentication while Protecting User Privacy NordSec 2016 Martin Potthast 1 Christian Forler 2 Eik List 1 Stefan Lucks 1 1 Bauhaus-Universität Weimar <firstname>.<lastname>(at)uni-weimar.de 2 Beuth Hochschule für Technik Berlin 04 Nov 2016 Outsourcing Phone-based Web Authentication 04 Nov 2016 1/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  2. Section 1 Motivation Outsourcing Phone-based Web Authentication 04 Nov 2016 2/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  3. Passwords Humans are bad at memorizing strong passwords Already 2007: Median user is registered at 25 web services [Florêncio and Herley, 2007] Passwords are unlikely to disappear in the near future Image: xato.net Outsourcing Phone-based Web Authentication 04 Nov 2016 3/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  4. Two-Factor Authentication 1st Factor 2nd Line of Defense against 2nd Factor Reused passwords Account or Personal Data Weak credentials or lacking 1st-factor policies Data breaches Phishing attacks . . . Image: https://www.google.com/landing/2step Outsourcing Phone-based Web Authentication 04 Nov 2016 4/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  5. Two-Factor Authentication Factors Something you know Unique tuple of username + password Idea: Duo Mobile 2014; Images: http://2.bp.blogspot.com/-3wBHxiz30Do/VEU8Ba4j7BI/AAAAAAAABo4/-gs07aNu7lA/s1600/homer-idea.png , https://frinkiac.com/caption/S06E02/42976 , http://s1.favim.com/orig/14/eye-homer-homer-simpson-simpson-simpsons-Favim.com-184669.jpg , https://upload.wikimedia.org/wikipedia/en/0/0b/Marge_Simpson.png Outsourcing Phone-based Web Authentication 04 Nov 2016 5/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  6. Two-Factor Authentication Factors Something you know Unique tuple of username + password Something you have Personal device or smartphone app Idea: Duo Mobile 2014; Images: http://2.bp.blogspot.com/-3wBHxiz30Do/VEU8Ba4j7BI/AAAAAAAABo4/-gs07aNu7lA/s1600/homer-idea.png , https://frinkiac.com/caption/S06E02/42976 , http://s1.favim.com/orig/14/eye-homer-homer-simpson-simpson-simpsons-Favim.com-184669.jpg , https://upload.wikimedia.org/wikipedia/en/0/0b/Marge_Simpson.png Outsourcing Phone-based Web Authentication 04 Nov 2016 5/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  7. Two-Factor Authentication Factors Something you know Unique tuple of username + password Something you have Personal device or smartphone app Something you are Fingerprint or retina scan Idea: Duo Mobile 2014; Images: http://2.bp.blogspot.com/-3wBHxiz30Do/VEU8Ba4j7BI/AAAAAAAABo4/-gs07aNu7lA/s1600/homer-idea.png , https://frinkiac.com/caption/S06E02/42976 , http://s1.favim.com/orig/14/eye-homer-homer-simpson-simpson-simpsons-Favim.com-184669.jpg , https://upload.wikimedia.org/wikipedia/en/0/0b/Marge_Simpson.png Outsourcing Phone-based Web Authentication 04 Nov 2016 5/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  8. Two-Factor Authentication Factors Something you know Unique tuple of username + password Something you have Personal device or smartphone app Something you are Fingerprint or retina scan Someone you know [Brainard et al., 2006] Idea: Duo Mobile 2014; Images: http://2.bp.blogspot.com/-3wBHxiz30Do/VEU8Ba4j7BI/AAAAAAAABo4/-gs07aNu7lA/s1600/homer-idea.png , https://frinkiac.com/caption/S06E02/42976 , http://s1.favim.com/orig/14/eye-homer-homer-simpson-simpson-simpsons-Favim.com-184669.jpg , https://upload.wikimedia.org/wikipedia/en/0/0b/Marge_Simpson.png Outsourcing Phone-based Web Authentication 04 Nov 2016 5/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  9. Phone-based Two-factor Authentication Benefits: Omnipresent, ubiquitous Spares users from carrying around additional devices Spares service providers from shipping devices Outsourcing Phone-based Web Authentication 04 Nov 2016 6/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  10. Phone-based Two-factor Authentication Benefits: Omnipresent, ubiquitous Spares users from carrying around additional devices Spares service providers from shipping devices Disadvantage: Difficult to implement from scratch = ⇒ outsourcing Outsourcing Phone-based Web Authentication 04 Nov 2016 6/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  11. Phone-based Two-factor Authentication Benefits: Omnipresent, ubiquitous Spares users from carrying around additional devices Spares service providers from shipping devices Disadvantage: Difficult to implement from scratch = ⇒ outsourcing Privacy? An honest-but-curious authentication provider potentially learns Usage statistics of users Usage statistics of service providers Relations of users to service providers Outsourcing Phone-based Web Authentication 04 Nov 2016 6/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  12. Phone-based Two-factor Authentication Benefits: Omnipresent, ubiquitous Spares users from carrying around additional devices Spares service providers from shipping devices Disadvantage: Difficult to implement from scratch = ⇒ outsourcing Privacy? An honest-but-curious authentication provider potentially learns Usage statistics of users Usage statistics of service providers Relations of users to service providers Goal of Passphone: Phone-based two-factor authentication scheme Outsource verification of 2nd factor while preserving privacy Outsourcing Phone-based Web Authentication 04 Nov 2016 6/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  13. Existing Phone-Based Two-Factor Authentication Schemes Time-based One-Time Passwords: Google 2-Step [Google, 2013] , Microsoft [Meisner, 2013] , Apple [Apple, 2016] , Facebook [Song, 2011] Cronto [VASCO, 2013] , Duo Mobile [Duo Security, 2016] Academia: SoundProof [Karapanos et al., 2015] : Avoided need for user interaction Shirvanian et al. [Shirvanian et al., 2014] : Resilience to off-line attacks PhoneAuth [Czeskis et al., 2012] MP-Auth [Mannan and van Oorschot, 2011] : No secret on device Tiqr [Van Rijswijk and Van Dijk, 2011] , Snap2Pass [Dodson et al., 2010] , QR-TAN [Starnberger et al., 2009] : QR-based PhoolProof [Parno et al., 2006] : Bookmark-based Outsourcing Phone-based Web Authentication 04 Nov 2016 7/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  14. Remarks Privacy-unaware users may be tracked down by other means: Users must avoid reuse or self-related credentials and mail addresses Users should hide their identity (e. g., use services like TOR) Base on TLS-secured connections Recommendations: Public-key pinning for Trusted Third Party Bind TLS connections to specific channel Goal: No additional angles for user profiling by second factor Outsourcing Phone-based Web Authentication 04 Nov 2016 8/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  15. Section 2 Passphone Protocols Outsourcing Phone-based Web Authentication 04 Nov 2016 9/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  16. Involved Parties T S Service provider Trusted Third T Party P User (prover) Prover’s telephone PT P S Prover’s mail box PM Outsourcing Phone-based Web Authentication 04 Nov 2016 10/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  17. Involved Parties T S Service provider Trusted Third T Party P User (prover) Prover’s telephone PT P S Prover’s mail box PM Assume: User has device PT and mail box PM under control Assume: TTP is honest (but curious) Encode protocol, step, version, and sender information in all messages Protocols: Registration, Activation, Authentication, Revocation, Rekeying Outsourcing Phone-based Web Authentication 04 Nov 2016 10/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  18. Passphone : Registration P ’s device PT generates and stores a key pair K public , K secret PT PT P T S Service provider ID X ID of X ( · ) X Signed by X Trusted Third Party Blinded ID of X E K �·� TLS-protected T h X P User (prover) Challenge of X N X Outsourcing Phone-based Web Authentication 04 Nov 2016 11/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  19. Passphone : Registration P submits public key and a blinded ID h PT = Hash ( N PT ) to T � � K public (1) E K , ID P M , h P T P T P T S Service provider ID X ID of X ( · ) X Signed by X T Trusted Third Party h X Blinded ID of X E K �·� TLS-protected P User (prover) N X Challenge of X Outsourcing Phone-based Web Authentication 04 Nov 2016 11/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  20. Passphone : Registration T sends challenge N T to P ’s mail account � � K public (1) E K , ID P M , h P T P T (2) X := ( N T ) T P T S Service provider ID X ID of X ( · ) X Signed by X T Trusted Third Party h X Blinded ID of X E K �·� TLS-protected P User (prover) N X Challenge of X Outsourcing Phone-based Web Authentication 04 Nov 2016 11/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

  21. Passphone : Registration P forwards challenge to PT � � K public (1) E K , ID P M , h P T P T (2) X := ( N T ) T (3) X P T S Service provider ID X ID of X ( · ) X Signed by X T Trusted Third Party h X Blinded ID of X E K �·� TLS-protected P User (prover) N X Challenge of X Outsourcing Phone-based Web Authentication 04 Nov 2016 11/27 Martin Potthast, Christian Forler, Eik List, Stefan Lucks

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend