Secure Cloud Identity Wallet Assessment Report on Cryptographic

Total Page:16

File Type:pdf, Size:1020Kb

Secure Cloud Identity Wallet Assessment Report on Cryptographic Project number: 653454 Project start: October 1, 2015 H2020-DS-2014-1 Project duration: 3 years Secure Cloud IdentityWallet D4.1 Assessment report on cryptographic technologies, protocols and mechanisms Document Identification Due date March 31, 2017 Submission date March 31, 2017 Revision 1.0 Related WP WP4 Dissemination PU Level Lead TUG Lead Author Felix Hörandner (TUG) Participant Contributing AIT, FOKUS, GUF, Related Deliv- D2.2, D2.3, D3.3, D4.2, Beneficiaries TUG, KGH, LISPA, SIC erables D4.3, D4.4, D5.1 D4.1 – Assessment report on cryptographic technologies, protocols and mechanisms Abstract: This report contains a detailed assessment and analysis of eligible basic crypto- graphic technologies, security protocols, and authentication mechanisms with respect to CRE- DENTIAL requirements. It gives an overview of the start of the art in the different areas, evaluates the existing schemes regarding efficiency, security, privacy, usability, etc., and makes concrete suggestions on which technologies to use in the project. This document is issued within the CREDENTIAL project. This project has received funding from the European Union’s Horizon 2020 Programme under grant agreement no. 653454. This document and its content are the property of the CREDENTIAL Consortium. All rights relevant to this document are determined by the applicable laws. Access to this document does not grant any right or license on the document or its contents. This document or its contents are not to be used or treated in any manner inconsistent with the rights or interests of the CREDENTIAL Consortium and are not to be disclosed externally without prior written consent from the CREDENTIAL Partners. Each CREDENTIAL Partner may use this document in conformity with the CREDENTIAL Consortium Grant Agreement provisions. The information in this document is provided as is, and no warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. D4.1 – Assessment report on cryptographic technologies, protocols and mechanisms Executive Summary On a high level, the central goal of the CREDENTIAL project is to develop a privacy-preserving data sharing platform (wallet) with integrated identity provider (IdP), which can be used to share authenticated data without the wallet learning any of the user’s personal information. The functionality and added value of these services will be showcased by concrete pilots from the domains of eGovernment, eHealth, and eBusiness. A central task that has to be performed in order to develop such a data sharing platform is the identification and evaluation of relevant base technologies, which is provided by this deliverable. First, we concisely introduce relevant technologies, covering different aspects of the generic data sharing system. These aspects include cryptographic technologies, authentication mechanisms, as well as identity and access management protocols and technologies. We perform assessments based on high-level criteria with a focus on security, privacy, usability and integration effort. These high-level criteria are then mapped to criteria specific to the technologies under evaluation. The criteria are motivated by CREDENTIAL’s use cases and requirements. As a result of the assessment, this deliverable makes concrete recommendations for technologies that should be considered in the design and implementation of the generic data sharing plat- form as technological basis. Also, this deliverable presents technologies, which could provide additional benefits to CREDENTIAL’s envisioned goal and might therefore be of interest for further research in order to apply them. Besides the generic technologies, we also present an overview of technologies relevant to the pilot use cases in order to facilitate a common understanding of the involved technological ecosystem. Finally, this deliverable provides detailed descriptions of relevant technologies in the appendix for the curious reader. This appendix also serves as a knowledge base for project participants to acquire information on technologies that are not in their core expertise. ii D4.1 – Assessment report on cryptographic technologies, protocols and mechanisms Document information Editors Name E-mail Organisation Bernd Zwattendorfer [email protected] SIC Felix Hörandner [email protected] TUG Contributors Name E-mail Organisation Stephan Krenn [email protected] AIT Christoph Striecks [email protected] AIT Thomas Lorünser [email protected] AIT Nicolas Notario McDonnell [email protected] ATOS Florian Thiemer fl[email protected] FOKUS Jörg Caumanns [email protected] FOKUS Jetzabel Serna [email protected] GUF Andreas Abraham [email protected] TUG Christof Rabensteiner [email protected] TUG Elias Klughammer [email protected] KGH Andrea Migliavacca [email protected] LISPA Alberto Zanini [email protected] LISPA Silvana Mura [email protected] LISPA Franco Nieddu [email protected] SIC Simon Roth [email protected] SIC Enrico Francescato [email protected] ICERT Reviewers Name E-mail Organisation Stephan Krenn [email protected] AIT Florian Thiemer fl[email protected] FOKUS Elias Klughammer [email protected] KGH History Version Date Reason/Change Editor 0.1 14.01.2016 Document creation Bernd Zwattendorfer 0.2 16.02.2016 Added General Factsheets Felix Hörandner 0.3 10.03.2016 Added eHealth Factsheets Florian Thiemer iii D4.1 – Assessment report on cryptographic technologies, protocols and mechanisms 0.4 18.03.2016 Added eGovernment Factsheets Andrea Migliavacca 0.5 02.05.2016 Added Technology Details: OpenID Co- Felix Hörandner nenct 0.6 02.05.2016 Added Technology Details: FIDO, SAML Andreas Abraham 0.7 25.05.2016 Added eBusiness Factsheets Enrico Francescato 0.8 27.05.2016 Added Technology Details: Proxy Re- Felix Hörandner Encryption 0.9 27.05.2016 Added Technology Details: SQRL Nicolas Notario 0.10 28.06.2016 Added Technology Details: Malleable Sig- Andreas Abraham natures 0.11 28.06.2016 Added Technology Details: OAuth Felix Hörandner 0.12 01.07.2016 Added Technology Details: UMA, XACML Andreas Abraham 0.13 01.07.2016 Added Technology Details: PDPs and Christoph Striecks PORs 0.14 15.07.2016 Added Technology Details: KMIP Andreas Abraham 0.15 27.07.2016 Added Technology Details: FHE and SE Christoph Striecks 0.16 27.07.2016 Added Technology Details: secret sharing, Stephan Krenn pseudonyms, TPASS 0.17 29.07.2016 Added Technology Details: Anonymous Jetzabel Serna credentials 0.18 29.07.2016 Added details for WS-* description Florian Thiemer 0.19 01.08.2016 Added e-Health Technology Details Jörg Caumanns 0.20 01.08.2016 Added Technology Details: SCIM Andreas Abraham 0.21 16.08.2016 Added eGovernment Technology Details Andrea Migliavacca Alberto Zanini 0.22 16.08.2016 Evaluated Identity Protocols Felix Hörandner 0.23 21.09.2016 Added Details for ABCs and PIR Jetzabel Serna 0.24 03.10.2016 Added Details for PKCS11 Andrea Migliavacca 0.25 13.10.2016 Evaluated Malleable Signatures Christoph Striecks 0.26 14.10.2016 Evaluated Secret Sharing Stephan Krenn 0.27 17.10.2016 Restructured Document Felix Hörandner 0.28 18.10.2016 Evaluated SCIM Andreas Abraham 0.29 25.10.2016 Evaluated PRE Types Felix Hörandner 0.30 03.11.2016 Evaluated Authorization Protocols Andreas Abraham 0.31 08.11.2016 Updated Introduction and Methodology Felix Hörandner 0.32 29.11.2016 Evaluated PDP, POR, PIR, ORAM, and Stephan Krenn FHE Thomas Lorünser 0.33 01.12.2016 Evaluated PRE vs ABE and redactable sig- Christoph Striecks natures vs anonymous credentials Stephan Krenn 0.34 20.12.2016 Evaluated searchable encryption and added Christoph Striecks details for remote attestation Stephan Krenn 0.35 20.12.2016 Evaluated KMIP and WebCrypto API Christof Rabensteiner 0.36 28.12.2016 Added Technology Details: TPM and TEE Franco Nieddu iv D4.1 – Assessment report on cryptographic technologies, protocols and mechanisms 0.37 13.01.2017 Evaluated TPM and TEE Franco Nieddu 0.38 13.01.2017 Improved structure of document Felix Hörandner 0.39 16.01.2017 Evaluated Authentication Technologies Jetzabel Serna 0.40 16.01.2017 Evaluated Verifiable Computing Felix Hörandner 0.41 16.01.2017 Evaluated Policy Languages Florian Thiemer 0.42 16.01.2017 Added abstract and acronyms Stephan Krenn 0.43 23.01.2017 Added introductions and floating text to Stephan Krenn core crypto technologies 0.44 24.01.2017 Added methodology section Stephan Krenn 0.45 24.01.2017 Added Introduction and introductions to Andrea Migliavacca eGovernment and eBusiness sections 0.46 26.01.2017 Finalized additional crypto section and Ap- Christoph Striecks pendix B 0.47 27.01.2017 Finalized protocols section Christof Rabensteiner 0.48 27.01.2017 Added Executive Summary Felix Hörandner 0.50 14.01.2017 Reviewing and fixing Felix Hörandner Stephan Krenn 0.51 14.02.2017 Added Conclusion Elias Klughammer 0.52 24.02.2017 Polished eGovernment and eBusiness sec- Silvana Mura tions 0.53 03.03.2017 Reviewed Document Florian Thiemer 0.54 07.03.2017 Addressed Review Comments Felix Hörandner Stephan Krenn 0.56 08.03.2017 Re-Wrote Conclusion Felix Hörandner 0.57 27.03.2017 Polishing Felix Hörandner 1.0 31.03.2017 Final copy-editing Stephan Krenn v D4.1 – Assessment report on cryptographic technologies, protocols and mechanisms Table of Contents 1 Introduction 1 1.1 The CREDENTIAL Project . .1 1.2 Scope of this Deliverable . .3 1.3 Relation to Other Deliverables . .4 1.4 Overview of Assessment Results . .4 1.5 Outline . .6 2 Assessment Methodology 7 2.1 Fact Sheet Description . .8 2.2 High-Level Criteria . .9 3 Core Cryptographic Technologies 11 3.1 Secure Data Sharing . 11 3.2 Authentic Data Disclosure . 22 3.3 Section Conclusion . 29 4 Additional Cryptographic Technologies 30 4.1 Authentication . 30 4.2 Access to Encrypted Data .
Recommended publications
  • CPAS04 Authenticator Options Version 1.0 11 November 2015
    GSM Association Non-confidential Official Document PDATA.03 - CPAS04 Authenticator Options CPAS04 Authenticator Options Version 1.0 11 November 2015 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2016 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V1.0 Page 1 of 38 GSM Association Non-confidential Official Document PDATA.03 - CPAS04 Authenticator Options Table of Contents 1 Introduction 3 1.1 Overview 3 1.2 Scope 3 1.3 Abbreviations 3 1.4 References 5 2 Level
    [Show full text]
  • Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System
    Modern password security for system designers What to consider when building a password-based authentication system By Ian Maddox and Kyle Moschetto, Google Cloud Solutions Architects This whitepaper describes and models modern password guidance and recommendations for the designers and engineers who create secure online applications. A related whitepaper, Password security ​ for users, offers guidance for end users. This whitepaper covers the wide range of options to consider ​ when building a password-based authentication system. It also establishes a set of user-focused recommendations for password policies and storage, including the balance of password strength and usability. The technology world has been trying to improve on the password since the early days of computing. Shared-knowledge authentication is problematic because information can fall into the wrong hands or be forgotten. The problem is magnified by systems that don't support real-world secure use cases and by the frequent decision of users to take shortcuts. According to a 2019 Yubico/Ponemon study, 69 percent of respondents admit to sharing passwords with ​ ​ their colleagues to access accounts. More than half of respondents (51 percent) reuse an average of five passwords across their business and personal accounts. Furthermore, two-factor authentication is not widely used, even though it adds protection beyond a username and password. Of the respondents, 67 percent don’t use any form of two-factor authentication in their personal life, and 55 percent don’t use it at work. Password systems often allow, or even encourage, users to use insecure passwords. Systems that allow only single-factor credentials and that implement ineffective security policies add to the problem.
    [Show full text]
  • Trusted Execution Environments
    Trusted Execution Environments Assaf Rosenbaum Technion - Computer Science Department - M.Sc. Thesis MSC-2019-03 - 2019 Technion - Computer Science Department - M.Sc. Thesis MSC-2019-03 - 2019 Trusted Execution Environments Research Thesis Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science Assaf Rosenbaum Submitted to the Senate of the Technion | Israel Institute of Technology Kislev 5779 Haifa November 2018 Technion - Computer Science Department - M.Sc. Thesis MSC-2019-03 - 2019 Technion - Computer Science Department - M.Sc. Thesis MSC-2019-03 - 2019 This research was carried out under the supervision of Prof. Eli Biham and Dr. Sara Bitan, in the Faculty of Computer Science. Acknowledgements First and foremost, I wish to thank my advisors, Prof. Eli Biham and Dr. Sara Bitan, for their incredible support during the work on thesis. Thank you for providing me the freedom to find my own path while constantly guiding and directing me. I learned a lot from both of you. I would also like to thank my parents, siblings and my parents-in-law for their help and support during this stressful time. Thank you for being there whenever I needed. A special thanks is due to my three lovely children, you sparkle my life with moment of pure joy. Most importantly, I would like to thank my beautiful wife, Lior. Thank you for your endless support, the long hours in which you worked hard to give me the time I needed to work and for always pushing me forward. You ar the light of my life and I love you very much.
    [Show full text]
  • A Closer Look at SQRL Research Findings
    A closer look at SQRL Agenda • SQRL introduction • Related work • SQRL design details • Research questions • Research method • Research findings • Conclusion UvA-SNE-RP1 presentation 1 A closer look at SQRL SQRL introduction: trigger Secure Quick Reliable Login UvA-SNE-RP1 presentation 2 A closer look at SQRL SQRL introduction: how it works QR-scanning QR-tapping QR-clicking UvA-SNE-RP1 presentation 3 A closer look at SQRL SQRL introduction: design goals SSO 2FA out-of-band (OOB) authentication no secret(s) exchange anonymity no (additional) TTP low friction deployment UvA-SNE-RP1 presentation 4 A closer look at SQRL Related work: SSO • Open standards • OpenID • TiQR UvA-SNE-RP1 presentation 5 A closer look at SQRL SQRL design details: crypto ID site (fixed) specific secret 1-F secret 2-F Brute Elliptic Force Curve UvA-SNE-RP1 presentation 6 A closer look at SQRL SQRL design details: more crypto Compromised ID ? • ID revocation support • proves ID ownership • uses additional keys • Lock (disable) • Unlock (enable/change) UvA-SNE-RP1 presentation 7 A closer look at SQRL SQRL design details: messages UvA-SNE-RP1 presentation 8 A closer look at SQRL Research questions • How does SQRL improve authentication security compared to related solutions? • What does SQRL offer to both parties? • What constraints must be met to guaranty this behaviour? • What additional features are relevant to extend deployability? • What attacks remain feasible and what countermeasures are to be considered? UvA-SNE-RP1 presentation 9 A closer look at SQRL
    [Show full text]
  • Zero-Knowledge User Authentication: an Old Idea Whose Time Has Come
    Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come Laurent Chuat, Sarah Plocher, and Adrian Perrig ETH Zurich Abstract User authentication can rely on various factors (e.g., a pass- word, a cryptographic key, and/or biometric data) but should not re- veal any secret information held by the user. This seemingly paradoxical feat can be achieved through zero-knowledge proofs. Unfortunately, naive password-based approaches still prevail on the web. Multi-factor authen- tication schemes address some of the weaknesses of the traditional login process, but generally have deployability issues or degrade usability even further as they assume users do not possess adequate hardware. This as- sumption no longer holds: smartphones with biometric sensors, cameras, short-range communication capabilities, and unlimited data plans have become ubiquitous. In this paper, we show that, assuming the user has such a device, both security and usability can be drastically improved using an augmented password-authenticated key agreement (PAKE) pro- tocol and message authentication codes. 1 Introduction User authentication still typically involves transmitting a plaintext password to the web server, which is problematic for many reasons. First, an attacker could obtain the user’s password using malware, a keystroke logger, phishing, or a man-in-the-middle attack. Second, the user might be using the same password on different websites, allowing a malicious server operator to impersonate the user. Third, if the website’s database is breached, although passwords may be protected by a hash function, a brute-force attack could reveal low-entropy pass- words. Fourth, as password-reuse and low-entropy passwords are problematic, users are constantly advised to pick new, long, complicated passwords.
    [Show full text]
  • SQRL: Anti-Phishing & Revocation
    Security Now! Transcript of Episode #426 Page 1 of 30 Transcript of Episode #426 SQRL: Anti-Phishing & Revocation Description: After following-up on a week chockful of interesting security news, Steve and Leo continue with their discussion of SQRL, the Secure QR code Login system, to discuss two recent innovations in the system that bring additional valuable features. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-426.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-426-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson has the latest - yes, another Java patch - and more information about Lavabit. More information about the NSA, too. What is a Ferret's Cannon? It's coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 426, recorded October 16th, 2013: SQRL, Anti-Phishing, and Revocation. It's time for Security Now!, the show that covers your privacy and security online. Somebody in the chatroom before we began the show today, Steve Gibson, Explainer in Chief, said we should call it "Insecurity Now!" since it really talks mostly about insecure. But not today. Today we're going to talk about better security. Steve Gibson: Well, yeah. Actually, this is one of those episodes where so much happened in the last week in security news that, I mean, we just - there's a whole bunch of really interesting stuff to talk about. And in the past when we've done that we've just said, okay, we're not going to have any major topic because too much happened.
    [Show full text]
  • Management Digitaler Identitäten : Aktueller Status Und Zukünftige Trends
    Management Digitaler Identitäten: Aktueller Status und zukünftige Trends Christian Tietz, Chris Pelchen, Christoph Meinel, Maxim Schnjakin Technische Berichte Nr. 114 des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität Potsdam ISBN 978-3-86956-395-4 ISSN 1613-5652 Technische Berichte des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität Potsdam Technische Berichte des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität Potsdam | 114 Christian Tietz | Chris Pelchen | Christoph Meinel | Maxim Schnjakin Management Digitaler Identitäten Aktueller Status und zukünftige Trends Universitätsverlag Potsdam Bibliografische Information der Deutschen Nationalbibliothek Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen Nationalbibliografie; detaillierte bibliografische Daten sind im Internet über http://dnb.dnb.de/ abrufbar. Universitätsverlag Potsdam 2017 http://verlag.ub.uni-potsdam.de/ Am Neuen Palais 10, 14469 Potsdam Tel.: +49 (0)331 977 2533 / Fax: 2292 E-Mail: [email protected] Die Schriftenreihe Technische Berichte des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität Potsdam wird herausgegeben von den Professoren des Hasso-Plattner-Instituts für Softwaresystemtechnik an der Universität Potsdam. ISSN (print) 1613-5652 ISSN (online) 2191-1665 Das Manuskript ist urheberrechtlich geschützt. Online veröffentlicht auf dem Publikationsserver der Universität Potsdam URN urn:nbn:de:kobv:517-opus4-103164 http://nbn-resolving.de/urn:nbn:de:kobv:517-opus4-103164
    [Show full text]
  • World Speed Skating Championships 2021
    On behalf of the KNSB, the Organizing Committee has the honor and pleasure to invite you to participate in the WORLD SPEED SKATING CHAMPIONSHIPS 2021 which will be held in Heerenveen, Netherlands on February 11-14, 2021 PROGRAM Wednesday, February 10, 2021 17:30 Online Team Leaders Meeting via MS Teams in combination with the online draw Invitation will be sent in due time Thursday, February 11, 2021 14:50 3000m Ladies 5000m Men Friday, February 12, 2021 15:10 Team Pursuit Ladies Team Pursuit Men 500m Men 500m Ladies Saturday, February 13, 2021 13:45 Semi-Finals Mass Start Ladies Semi-Finals Mass Start Men 1000m Ladies 1000m Men Final Mass Start Ladies Final Mass Start Men Sunday, February 14, 2021 12:35 1500m Ladies 1500m Men 5000m Ladies 10 000m Men REGULATIONS The ISU World Speed Skating Championships 2021 (Single Distances & Team Pursuit) will be held in accordance with the 2018 Regulations of the International Skating Union (ISU), relevant ISU Communications, in particular ISU Communication No. 2361, Guidelines for ISU Events During the COVID-19 Pandemic and all Health Regulations guidelines edited and released by House of Sports. Participation in the Championships is open to Skaters who belong to an ISU Member (Rule 130, paragraph 1) that has been allocated quota place(s) for the Championships, and who have met the qualification criteria according to Rule 208 and ISU Communication No. 2361. TRACK Thialf is an indoor artificially frozen ice rink with a standard track of 400 meters and inner and outer curves with radii of 26 and 30 meters respectively.
    [Show full text]
  • Justin Love FVCP 2018-03-14 Outline
    Next Get Authentication SQRL and other trends in authentication systems Justin Love FVCP 2018-03-14 Outline • Theft of Server DB • Weak Passwords • Loss of User Information • Theft of User Information Next Get Authentication SQRL and other trends in authentication systems Justin Love FVCP 2018-03-14 Secure Quick Reliable Login Justin Love [email protected] http://wondible.com @wondible THREAT Theft of Server Database https://duckduckgo.com/?q=database+compromise “Three may keep a secret if two are dead. –Benjamin Franklin Some Secrets Should not be shared Nothing to Lose Public/Private Key Cryptography One Way Functions SSH Elliptic Curve https://en.wikipedia.org/wiki/File:EllipticCurveCatalog.svg Elliptic Curve https://en.wikipedia.org/wiki/File:EllipticCurveCatalog.svg ED25519 http://arstechnica.com/security/2013/10/a-relatively-easy- to-understand-primer-on-elliptic-curve-cryptography/ Bitcoin AES Bittorrent Sync FIDO UAF “256 bits is the new black.” –Steve Gibson https://github.com/jedisct1/libsodium THREAT Weak Passwords Weak https://xato.net/passwords/more-top-worst-passwords/ Password Schemes http://xkcd.com/936/ Forgotten http://xkcd.com/936/ Reused http://xkcd.com/792/ Password Manager Something you Know Something you Have Something you Are Agents Apps Mobile Push Authentication Public/Private Key Cryptography SSH Crypto Currency Wallet SQRL Secure the Private Key Encryption Levels of Protection Multi-level Encryption THREAT Loss of User Information User Responsibility Out-of-band may be possible Offline Storage MetaMask Words
    [Show full text]
  • SQRL Revisited
    Security Now! Transcript of Episode #516 Page 1 of 27 Transcript of Episode #516 SQRL Revisited Description: Security and privacy-related news keeps coming! So this week Father Robert and I will cover the past week's many interesting events. Then we revisit the much evolved and nearly finalized SQRL protocol to see how it has grown and matured during the 92 weeks since I first disclosed its concept during Podcast 424 with Tom. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-516.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-516-lq.mp3 SHOW TEASE: Today with Steve Gibson: Hacking Team follies, UEFI nightmare. Can exceptional access exist beside strong encryption? And everything you ever wanted to know about SQRL but were afraid to ask. Security Now! is next. FATHER ROBERT BALLECER: This is Security Now! with Steve Gibson, Episode 516, recorded July 14th, 2015: Hacking Team vs. SQRL. It's time for Security Now!, the show that covers your privacy and security online with the one, the only, the incomparable Steve Gibson from GRC.com. That's right, the creator of ShieldsUP!, SpinRite, and soon SQRL. Steve, so good to see you again, my friend. Steve Gibson: Well, Father, this is our third and final podcast together. And, boy, based on the feedback from the last couple, you're definitely a hit as my co-host. So anytime Leo feels that he needs to take a break from this, I know that you'll be welcome back.
    [Show full text]
  • Lousy Phish— Relay Attacks on Visual Code Authentication Schemes
    I bought a new security token and all I got was this lousy phish| Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano fgraeme.jenkinson, max.spencer, chris.warrington, [email protected] University of Cambridge Computer Laboratory, Cambridge, UK Abstract. One recent thread of academic and commercial research into web authentication has focused on schemes where users scan a visual code with their smartphone, which is a convenient alternative to password- based login. We find that many schemes in the literature (including, previously, our own) are, unfortunately, vulnerable to relay attacks. We explain the inherent reasons for this vulnerability and offer an architec- tural fix, evaluating its trade-offs and discussing why it has never been proposed by other authors. 1 Introduction We consider a relatively new class of web authentication schemes, currently at- tracting significant academic and commercial interest, which we refer to as visual code authentication schemes. A user may log into a website which supports such an authentication scheme by scanning a visual code, such as a Quick Response (QR) code [1], using their hand-held authenticator device, henceforth scanner. The scanner is generally a smartphone, but might be a dedicated hardware gad- get. The user carries their scanner at all times, or at least whenever they might want to authenticate to a website; the scanner may have a mechanism to prevent its misuse if lost or stolen. Our own Pico system [2] is of course in this class too. Such schemes are interesting because they have some important usability benefits which passwords do not; specifically, there is nothing for users to remem- ber or type1.
    [Show full text]
  • Sqrl and U2f As 2Fa for Cern Sso
    EVALUATION AND IMPLEMENTATION OF SQRL AND U2F AS 2FA FOR CERN SSO SUPERVISORS BY VINCENT BRILLAULT (IT-DI-CSO) AZQA NADEEM (IT-DI-CSO) STEFAN LUEDERS (IT-DI-CSO) PROJECT GOALS 2 AZQA NADEEM (IT-DI-CSO) PROJECT GOALS Evaluation of SQRL and U2F 2 AZQA NADEEM (IT-DI-CSO) PROJECT GOALS Evaluation of SQRL and U2F Implementation of feasible 2FA algorithm 2 AZQA NADEEM (IT-DI-CSO) PROJECT GOALS Evaluation of SQRL and U2F Implementation of feasible 2FA algorithm Integration with CERN Single Sign-on (SSO) 2 AZQA NADEEM (IT-DI-CSO) 2ND FACTOR AUTHENTICATION 3 AZQA NADEEM (IT-DI-CSO) 2ND FACTOR AUTHENTICATION 3 AZQA NADEEM (IT-DI-CSO) 2ND FACTOR AUTHENTICATION 4 AZQA NADEEM (IT-DI-CSO) 2ND FACTOR AUTHENTICATION • Username • Password 5 AZQA NADEEM (IT-DI-CSO) 2ND FACTOR AUTHENTICATION • Cell phone • Physical token • Biometrics 6 AZQA NADEEM (IT-DI-CSO) CERN SINGLE SIGN-ON 7 AZQA NADEEM (IT-DI-CSO) CERN SINGLE SIGN-ON SMS 7 AZQA NADEEM (IT-DI-CSO) CERN SINGLE SIGN-ON SMS Google Authenticator 7 AZQA NADEEM (IT-DI-CSO) CERN SINGLE SIGN-ON SMS Google Authenticator Yubikey 7 AZQA NADEEM (IT-DI-CSO) CERN SINGLE SIGN-ON SMS Google Authenticator Yubikey Smartcard 7 AZQA NADEEM (IT-DI-CSO) CERN SINGLE SIGN-ON Can we do better? 8 AZQA NADEEM (IT-DI-CSO) SQRL VS. U2F Secure Quick Reliable Login (SQRL) Universal 2nd Factor (U2F) 9 AZQA NADEEM (IT-DI-CSO) SECURE QUICK RELIABLE LOGIN (SQRL) 10 AZQA NADEEM (IT-DI-CSO) SECURE QUICK RELIABLE LOGIN (SQRL) • Software based authentication mechanism 10 AZQA NADEEM (IT-DI-CSO) SECURE QUICK RELIABLE LOGIN (SQRL)
    [Show full text]