Authentication #
Means of Authentication #
Something a user knows
- passwords
- PIN
- Patterns
Something a user has
- Physical Keys
- Smart cards
Something a user is
- Fingerprint
- Retina
- Face recognition
Something a user does
- Voice recognition
- Handwriting recognition
Passwords #
Passwords are a knowledge based authentication mechanism.
Strengths #
- cheap to implement
- easy to renew and to revoke
- easy to understand & accessible
- users have been trained to use them
- hardware independent
Weaknesses #
- strong passwords are hard to remember
- dictionary attacks
- passwords are often predictable
- users do not know what a hard to crack password is
- theoretic password space vs. actually used password space
- password reuse/management
- fallback security questions
Biometrics #
Strengths #
- convenient
- effortless
- fast
Weaknesses #
- not as secure as marketed
- non-revocable
- doesn’t work 100% of the time
- requires fallback authentication
- accessibility problems (e.g. weak fingerprints due to intense manual labor)
Behavioral Biometrics #
Behavioral Biometrics are behavior based authentication mechanisms.
Strengths #
- implicit
- enables continuous authentication
Weaknesses #
- very weak measure
- many false positives/negatives
- does not work well under realistic conditions
- requires training
- requires data collection over a period of time for classification
Other Authentication Methods #
Two Factor Authentication #
Two factor authentication (2FA) is a method of confirming a user’s claimed identity by using two different components.
Its a combination of what users know and what they have.
2FA is not very useable.
Password Managers #
Password managers are a way to store and manage passwords.
They solve the problem of:
- remembering passwords
- password reuse
- creation of strong passwords
Password managers introduce a single point of failure.
Fallback Authentication #
Fallback authentication is a method of authentication that is used when the primary authentication method fails. These are often in form of security questions and PIN codes.
Studies have shown that users often choose even more weaker passwords when they are only used as fallback authentication. This makes all passwordless methods vulnerable to attacks.
Passwords can’t be replaced because all alternative methods require a fallback authentication mechanism.
Hardware Keys #
Hardware keys are a way to authenticate a user by using a physical device.
Hardware keys are often in form of UBS sticks, smart cards or QR codes. The user needs to be in physical possession of the device to authenticate. Furthermore authenticity checks are needed to ensure that tokens and certificates are not replaced, modified, or counterfeit.
Hardware keys are susceptible to Supply Chain Attacks.