Not Built On Sand. IT Has Scaled $$$ Technological capabilities: (1971  2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980 

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Mobile Devices in the DoD
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Fast IDentity Online – a new industry alliance formed to develop technical standards that enable Internet Services to use Simpler Stronger Auth solutions.
Digital Certificate Installation & User Guide For Class-2 Certificates.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Lecture 23 Internet Authentication Applications
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Electronic Transaction Security (E-Commerce)
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
Using Digital Credentials On The World-Wide Web M. Winslett.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
魂▪創▪通魂▪創▪通 Digital Certificate and Beyond Sangrae Cho Authentication Research Team.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
1 Confidential Authentication Session Hannes Tschofenig.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Copyright © 2014 Synaptics Incorporated. All Rights ReservedPage 1 Copyright © 2014 Synaptics Incorporated. All Rights Reserved. This information and any.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
“The FIDO Alliance Today”
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
The FIDO Approach to Privacy Hannes Tschofenig, ARM Limited 1.
1. U2F Case Study Examining the U2F paradox 3 What is Universal 2 nd Factor (U2F)?
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Information Systems Design and Development Security Precautions Computing Science.
Identity Standards Architect, Microsoft
Azure Active Directory - Business 2 Consumer
Introduction to Windows Azure AppFabric
Windows Azure AppFabric
FIDO U2F Universal 2nd Factor
Enhancing Web Application Security with Secure Hardware Tokens
NextGen Access Control Platform
Operating Systems Security
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
X-Road as a Platform to Exchange MyData
NHS Identity Authentication fit for modern health and social care
Google Account Recovery Process
Presentation transcript:

Not Built On Sand

IT Has Scaled $$$ Technological capabilities: (1971  2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980  2013) HDD $/MB /12k NV RAM $/MB /1.3m Ubiquity: More than 7bn mobile connected devices by end of 2013 Networked: (2013) 34% of all people ww have internet access Relevance: (2012) $1 trillion eCommerce Social media: (2013) >10% of all people ww active Authentication hasn‘t

Passwords Don’t Work 1.Most people use words from a small set of simple passwords 2.People reuse passwords 3.Passwords are hard to use 4.Passwords get phished 5.Websites don’t protect passwords properly

There are alternatives…

Implementation is the challenge Each new authentication solution requires: New Software New Hardware New Infrastructure Consumer education We’re building ‘Silos’ of authentication

FIDO Goals Support for a broad range of authentication methods, leverage existing hardware capabilities. Support for a broad range of assurance levels, let relying party know the authentication method. Built-in privacy.

How does FIDO work? FIDO SERVER FIDO Authenticators Authenticator

FIDO Functionality Discover supported authenticators on the client Register authenticators to a relying party Authenticate (a session) Transaction confirmation

Registration Overview FIDO AUTHENTICATOR FIDO SERVER FIDO CLIENT Send Registration Request: -Policy -Random Challenge Start registration Authenticate user Generate key pair Sign attestation object: Public key AAID Random Challenge Name of relying party Signed by attestation key Verify signature Check AAID against policy Store public key AAID = Authenticator Attestation ID, i.e. model ID

Authentication Overview FIDO AUTHENTICATOR FIDO SERVER FIDO CLIENT Send Authentication Request: -Policy -Random Challenge Start authentication Authenticate user Sign authentication object: Random Challenge Name of relying party Signed by authentication key for this relying party Verify signature check AAID against policy

FIDO Building Blocks FIDO USER DEVICE FIDO CLIENT RELYING PARTY FIDO SERVER FIDO Repository FIDO AUTHENTICATOR WEB Application BROWSER / APP Cryptographic authentication key reference DB Authenticator attestation trust store Attestation key Authentication keys Update OSTP TLS Server Key

FIDO and IAM Physical-to-digital identity User Management Authentication Federation Single Sign-On Passwords Risk-Based Strong Modern Authentication

IMPLICIT AUTHENTICATION EXPLICIT AUTHENTICATION

FIDO and Federation FIDO PASSWORDS SSO/FEDERATION First MileSecond Mile SAML OpenI D

FIDO and Federation FIDO USER DEVICE FIDO CLIENT IdP FIDO SERVER FIDO AUTHENTICATOR FEDERATION SERVER BROWSER / APP OSTP Service Provider Federation Id DB Knows details about the Authentication strength (based on attestation) Knows details about the Identity verification strength.

Thank You

FIDO Alliance Members Board of Directors CrucialTec Google Nok Nok Labs PayPal Lenovo NXP Semiconductor Validity Sensors Yubico BlackBerry Sponsor Members Entersekt EyeLock FingerPrint Cards Infineon Ping Identity SecureKey WWTT Associate Members AktivSoft Agnitio AllWeb Technologies Authentify Certus Check2Protect Cloud Security Corp Crocus Technology Diamond Fortress Discretix Insyndia ItsMe! Security PassBan SurePassID Toopher Founding members underlined

The Authenticator Concept FIDO Authenticator User Authentication / Presence Secure Display Attestation Key Authentication Key(s) User Injected at manufacturing, doesn’t change Generated at runtime (on Registration)

Regarding AAIDs FIDO Authenticator Using HW based crypto Pure SW based implementation Based on FP Sensor X Based on Face Recognition alg. Y AAID 1 AAID 2

Registration Overview (2) Physical Identity Virtual Identity FIDO AUTHENTICATOR FIDO SERVER WEB Application { userid=1234, known since 03/05/04, payment history=xx, … { userid=1234, pubkey=0x43246, AAID=x +pubkey=0xfa4731, AAID=y } Registration AAID y key for foo.com: 0xfa4731 Relying Party foo.com Link new Authenticator to existing userid “Know Your Customer” rules Legacy Authentication