Authentication

Definition

Proof that an identity has a claimed identity attribute.

Proof Type

  • Something known.

    • A secret memorized.

  • Something we have.

    • An object/token.

  • Something we are.

    • Biometry.

Multi-factor authentication: join or consecutive use of different proof types.

Goals

Authenticate interactors.

  • People, services, servers, hosts, networks, etc.

Enable the enforcement of authorization policies and mechanisms.

  • Authorization -> authentication.

Facilitate the exploitation of other security-related protocols.

  • e.g. key distribution for secure communication.

Requirements

Trustworthiness

How good is it in proving the identity of an entity?

How difficult is it to be deceived?

Level of Assurance (LoA) (NIST, eIDAS, ISO 29115).

  • LoA 1 - Little or no confidence in the asserted identity.

  • LoA 2 - Some confidence in the asserted identity.

  • LoA 3 - High confidence in the asserted identity.

  • LoA 4 - Very high confidence in the asserted identity.

Secrecy

No disclosure of secrets used by legitimate entities.

Robustness

Prevent attacks on the protocol data exchanges.

Prevent on-line DoS attack scenarios.

Prevent off-line dictionary attacks.

Simplicity

It should be as simple as possible to prevent entities from choosing dangerous shortcuts.

Deal with vulnerabilities introduced by people

They have a natural tendency to facilitate or to take shortcuts.

Entities and deployment model

Entities

  • People

  • Hosts

  • Networks

  • Services/ servers

Deployment model

Along the time.

  • Only when interaction starts.

  • Continuously along the interaction.

Directionality.

  • Unidirectional.

  • Bidirectional.

Last updated