Justin Love FVCP 2018-03-14 Outline

Justin Love FVCP 2018-03-14 Outline

Next Get Authentication SQRL and other trends in authentication systems Justin Love FVCP 2018-03-14 Outline • Theft of Server DB • Weak Passwords • Loss of User Information • Theft of User Information Next Get Authentication SQRL and other trends in authentication systems Justin Love FVCP 2018-03-14 Secure Quick Reliable Login Justin Love [email protected] http://wondible.com @wondible THREAT Theft of Server Database https://duckduckgo.com/?q=database+compromise “Three may keep a secret if two are dead. –Benjamin Franklin Some Secrets Should not be shared Nothing to Lose Public/Private Key Cryptography One Way Functions SSH Elliptic Curve https://en.wikipedia.org/wiki/File:EllipticCurveCatalog.svg Elliptic Curve https://en.wikipedia.org/wiki/File:EllipticCurveCatalog.svg ED25519 http://arstechnica.com/security/2013/10/a-relatively-easy- to-understand-primer-on-elliptic-curve-cryptography/ Bitcoin AES Bittorrent Sync FIDO UAF “256 bits is the new black.” –Steve Gibson https://github.com/jedisct1/libsodium THREAT Weak Passwords Weak https://xato.net/passwords/more-top-worst-passwords/ Password Schemes http://xkcd.com/936/ Forgotten http://xkcd.com/936/ Reused http://xkcd.com/792/ Password Manager Something you Know Something you Have Something you Are Agents Apps Mobile Push Authentication Public/Private Key Cryptography SSH Crypto Currency Wallet SQRL Secure the Private Key Encryption Levels of Protection Multi-level Encryption THREAT Loss of User Information User Responsibility Out-of-band may be possible Offline Storage MetaMask Words toilet truck film burger program evidence slam weird dolphin fitness tool agree Levels of Storage Semaphor Spideroak Software Recovery Key toilet truck film burger program evidence slam Daily Use Key “Keyring” SQRL Identity Unlock Key Encrypted with Rescue Code (24 digits) Identity Master Key THREAT Theft of User Information Cold Wallets Levels of Keys and Rights Recovery Account Manages Daily Accounts Semaphor Spideroak Software Keyring Rotation SQRL Identity Unlock Key Identity Master Key Lock Current Identity Previous Identity Disable • Disable with IMK (daily use) • Enable only with IUK (recovery) Review • Theft of Server DB - Public/Private Key Crypto • Weak Passwords - Agents and Levels of Protection • Loss of User Information - Levels of Storage • Theft of User Information - Levels of Storage Resources https://pinboard.in/u:wondible/t:next-gen-auth/ https://pinboard.in/u:wondible/t:sqrl/ https://pinboard.in/u:wondible/t:sqrl/ Justin Love [email protected] http://wondible.com @wondible.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    65 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us