THE STATE OF AUTHENTICATION Chad Spensky Allthenticate OUTLINE - - PowerPoint PPT Presentation

the state of authentication
SMART_READER_LITE
LIVE PREVIEW

THE STATE OF AUTHENTICATION Chad Spensky Allthenticate OUTLINE - - PowerPoint PPT Presentation

THE STATE OF AUTHENTICATION Chad Spensky Allthenticate OUTLINE Who am I? Authentication overview Current state of Authentication The future of authentication MY JOURNEY 2012-2015 2004-2011 2015-Present 1998-2004 Staff at MIT


slide-1
SLIDE 1

THE STATE OF AUTHENTICATION

Chad Spensky Allthenticate

slide-2
SLIDE 2

OUTLINE

  • Who am I?
  • Authentication overview
  • Current state of Authentication
  • The future of authentication
slide-3
SLIDE 3

MY JOURNEY

Internet Pirate Console Modder B.S. in CS & Math M.S. in CS (Authentication) Staff at MIT LL Offensive Security 1998-2004 2004-2011 2012-2015 2015-Present Ph.D. CS (Security) Founder of Allthenticate

slide-4
SLIDE 4

THE PROBLEM

Everyone should not have access to everything.

slide-5
SLIDE 5

AUTHENTICATION

Only permitting authorized users to access a resource

Chad

slide-6
SLIDE 6

AUTHENTICATION

Real World Digital World

slide-7
SLIDE 7

AUTHENTICATION

  • What you know
  • What you have
  • What you are
slide-8
SLIDE 8

PASSWORDS

Today

More than 15 usernames More than 150 saved passwords Dedicated apps cspensky@gmail.com cspensky@ucsb.edu cspensky@mit.edu chad.spensky@ll.mit.edu cspensky@unc.edu chad@allthenticate.net chad@cspensky.info cspensky@comcast.net cspensky@cs.ucsb.edu cspensky@alumni.pitt.edu cspensky@alumni.unc.edu ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* *******

slide-9
SLIDE 9

HARDWARE TOKENS

Employee

Second Factor Hardware Credential Smartphone Portable Computer

slide-10
SLIDE 10

BIOMETRICS

Fingerprint Voice Recognition FaceID

slide-11
SLIDE 11

AUTHENTICATION IMPLEMENTATIONS

slide-12
SLIDE 12

HOW PASSWORDS WORK

Chad1 Chad1 ac18753fe31 Encrypted Tunnel Secure Hash Function Keyboard Entry Hash saved Chad1

slide-13
SLIDE 13

HOW PASSWORDS FAIL

Chad1 Chad1 ac18753fe31 Encrypted Tunnel Secure Hash Function Keyboard Entry Hash saved Chad1

slide-14
SLIDE 14

https://xkcd.com/538/

slide-15
SLIDE 15

HOW 2FA WORKS

Chad1 ac18753fe31 Secure Hash Function 1234 Chad1 1234 Chad1 1234

slide-16
SLIDE 16

HOW 2FA FAILS

Chad1 Chad1 ac18753fe31 Secure Hash Function 1234 1234 Chad1 1234

slide-17
SLIDE 17

HOW 2FA WORKS

(BETTER SOLUTION)

Chad1 Chad1 ac18753fe31 Secure Hash Function Challenge Response

slide-18
SLIDE 18

https://www.techspot.com/news/78292-new-reverse-proxy-tool-posted-github-can-easily.html

slide-19
SLIDE 19

HOW TOKENS WORK

Request Token Required Challenge Response

slide-20
SLIDE 20

HOW TOKENS FAIL

Request Token Required Challenge Response

slide-21
SLIDE 21

https://nakedsecurity.sophos.com/2019/06/17/yubico-recalls-fips-yubikey-tokens-after-flaw-found/

slide-22
SLIDE 22

HOW BIOMETRICS WORK

Request Biometric Required Challenge Signed Response Do X? Yes

slide-23
SLIDE 23

HOW BIOMETRICS WORK

Request Biometric Required Challenge Signed Response Do X? Yes

slide-24
SLIDE 24

http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm

slide-25
SLIDE 25

SECURITY VS USABILITY VS COST

slide-26
SLIDE 26

FINDING THE RIGHT FIT

Security Value of Asset

slide-27
SLIDE 27

FINDING THE RIGHT FIT

Security User Burden

slide-28
SLIDE 28

FINDING THE RIGHT FIT

Security

*******

User Burden

slide-29
SLIDE 29

FINDING THE RIGHT FIT

Security Implementation Cost

slide-30
SLIDE 30

FINDING THE RIGHT FIT

*******

Security Implementation Cost

slide-31
SLIDE 31

THE PROBLEM

There are too many options

slide-32
SLIDE 32

WE NEED FLEXIBILITY

slide-33
SLIDE 33

WE NEED FLEXIBILITY

*******

slide-34
SLIDE 34

MORE SECURITY. LESS BURDEN.

chad@allthenticate.net www.allthenticate.net