Presentation on theme: "Josh Tate. Advanced AuthenticationIntroduction Very broad subject and highly researched. Focused on topics that could be quick to implement and."— Presentation transcript:
Advanced AuthenticationIntroduction Very broad subject and highly researched. Focused on topics that could be quick to implement and (somewhat) inexpensive. Solutions that could be used at home/work/public.
Advanced AuthenticationWhat is Authentication: Most common ways to authenticate today: Something you know Something you have Something you know/have ?
Advanced AuthenticationWhat is Authentication: Authentication Technique ExampleProperties Something you have Credit Card Car Key Badge Lost / Stolen Duplicated Shared Something you know Login ID / Password ATM PIN Forgotten Shared Guessed Something you are Fingerprint Eyes / Face Voice Cannot be lost / stolen Cannot guess / forge Cannot be shared (easily)
Advanced AuthenticationAuthentication Methods I will cover: Fingerprint / Knuckle Identification Fingerprint & smart card combinations EyePassShape
Advanced AuthenticationFingerprint / Knuckle Identification “No two fingerprints have ever been found alike in many billions of human and automated computer comparisons. Fingerprints are the very basis for criminal history foundation at every police agency on earth. Fingerprinting established the first forensic professional organization, the International Association for Identification (IAI), in 1915.”  Researchers noticed that fingerprints could uniquely identify people as early as the 1800’s.
FeatureProperties CrossoverIntersection point CoreU-Turn BifurcationFork Ridge EndingDead End DeltaSplit IslandDual dead ends Advanced AuthenticationFingerprint / Knuckle Identification
Advanced AuthenticationFingerprint & smart card combinations Very secure because it combines all 3 authentication techniques (are/have/know) The research paper pitched this idea as a replacement for Passports / Drivers License / Credit Cards etc. Stolen Wallet?
Advanced AuthenticationEyePassShape Public authentication is time-critical. Authentication token should be easy to remember. Authentication has to be secure. Authentication methods have to be easily deployable.
Advanced AuthenticationEyePassShape EyePIN Not very Time-Critical Very Secure Pass ShapeNot very Secure Very Fast Both are easy to deploy and are easy to remember
Advanced AuthenticationEyePassShape Fast Easy to Remember Secure Deployable
Advanced AuthenticationReferences  The History of Fingerprints, January 2012,  Biometric Education » Fingerprint,  Pallav Gupta, Srivaths Ravi, Anand R, Kiral K. Jha, Efficient fingerprint-based user authentication for embedded systemsm DAC 2005 Proceedings of the 42 nd annual Design Automation Conference,  Lionel Beauge, Andrzej Drygallo, 2010, Fully featured secure biometric smart card device for fingerprint-based authentication and identification, MM&Sec 2010 Proceedings of the 12 th ACM workshop on multimedia and security,  Alexander De Luca, Martin Denzel, Heinrich Hussmann, 2009, Look Into My Eyes!: can you guess my password?, SOUPS th Symposium on Usable Privacy and Security, Article 8.