hitoshi

The ID Federation: What Technology Can Displace The Password?

The Future Password

Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password.

Some people might say that multi-factor authentications or ID federations will do it. It is not easy, however, to conceive that the password can be displaced by multi-factor schemes for which one of the factors is a password or ID federations which require a reliable password as the master-password.

Some might say “Not using any password altogether is the way to kill the password dead”. Yes, I have to admit, the password could then be killed dead entirely, but it would be criminals rather than us that will be the beneficiaries of such password-free cyber space. In a world where we live without remembered passwords, i.e., where our identity is established without our volitional participation, we would be able to have a safe sleep only when we are alone in a firmly locked room. It would be a Utopia for criminals and a Dystopia for most of us.

shutterstock_379201975

Some might say “PIN can”. This observation would, however, only lead us to the entrance to Alice’s Wonderland. If a PIN that is a weak form of numbers-only password could displace the password, a puppy should be able to displace the dog, a kitten the cat, a cub the lion.

Many are saying “Biometrics can”. This observation would lead us to another entrance to Alice’s Wonderland. Biometric solutions used in cyber space need a password (fallback password) registered in case of false rejection. If “something” which has to rely on“the other thing” could displace “the other thing”, your foot should be able to displace your leg for walking. Alice’s Wonderland might receive it, but I have huge difficulties in imagining what it could look like in this 4D Space-Time universe.

There are a lot of people who take it for granted that the password can be displaced by the biometrics operated in cyberspace together with a fallback password. How could such a misconception happen?

Blind Spot in Our Mind

Let us imagine that we are watching two models of smart phones – Model A with Pincode and Model B with Pincode and Fingerprint Scan. Which of the two models do you think is securer?

  • when you hear that Model A is protected by Pincode while Model B is protected by both Pincode and Fingerprints
  • when you hear that Model A can be unlocked by Pincode while Model B can be unlocked by both

Pincode and Fingerprints

  •  when you hear that Model A can be attacked only by Pincode while Model B can be attacked by both Pincode and Fingerprints

Is your observation the same for all the 3 situations?

Eye-Opening Experience

Now let us imagine that there are two houses – (1) with one entrance and (2) with two entrances placed in parallel. Which house is safer against burglars? Every one of us will agree that the answer is plainly (1). Nobody would dare to allege that (2) is safer because it is protected by two entrances. Similarly, the login by a Pincode/password alone is securer than the login by a biometric sensor backed up by a fallback Pincode/password.

Debates over Backdoor between Apple vs FBI

It appears that something crucial is overlooked in the heated debates about the backdoor on smartphones, which is the focus point of the recent events with Apple and the FBI that have drawn a lot of attention worldwide.

I would like to point out that there already exists a backdoor on many of the latest smartphones, namely, a fingerprint scanner or a set of camera and software for capturing faces, irises and other body features which are easily collected from the unyielding, sleeping, unconscious and dead people.

As the technologies of sensing biometric features advance, so do the technologies of copying and replaying them. None of body temperature, movement, pulse and brainwave can be exceptions. Biometrics could be great technologies for forensic and physical security, but far from valid for identity assurance in cyber space.

Suggestions

As analysed above, the authentication by biometrics in cyber space comes with poorer security than Pincode/password-only authentication in most cases. A false sense of security is often worse than the lack of security. I would like to put forward the suggestions below.

  • The vendors of those smart devices, who are conscious of privacy and security of consumers, could tell the consumers not to turn on the biometric functions.
  • Consumers, who are concerned about their privacy and security, could refrain from activating the biometric backdoors.
  • The deployment of biometric solutions could instead be recommended where consumers can accept “below-one” factor authentication in return for better convenience as the case may be.

By Hitoshi Kokumai

Hitoshi Kokumai

President, Mnemonic Security, Inc. Hitoshi has been studying and writing about cyber security for a number of years. You can see his work on many leading online technology publications.

View Website

Hitoshi is the Founder of Mnemonic Security, Inc. He has been studying and writing about cyber security for several years and his work has appeared in a number of security related publications.

Business Intelligence And Analytics In The Cloud, 2017

Business Intelligence And Analytics In The Cloud, 2017

Business Intelligence In The Cloud, 2017 78% are planning to increase the use of cloud for BI and data management ...
Being relevant, leading and remaining differentiated in the era of AI

Being relevant, leading and remaining differentiated in the era of AI

In the previous post "Yes, AI could be smart enough to take your job," I mentioned that AI would affect the way ...
cloud computing certification

Why Certification Matters for Cloud Service Providers

Certification for Cloud Service Providers As of 2017, the concept of “cloud” has become more of a norm for companies ...
Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

2018 Augmented Reality If you’ve never heard of “Pokémon Go” — or at least never had the concept explained to ...
Tesla is Worth More Than Ford or GM. Is this the Automakers iPhone Moment?

Tesla is Worth More Than Ford or GM. Is this the Automakers iPhone Moment?

The Automakers iPhone Moment Remember Blackberry? How about Nokia or Motorola? Vaguely you say. Will we one day state the ...
How IoT and OT collaborate to usher in the data-driven factory of the future

How IoT and OT collaborate to usher in the data-driven factory of the future

The Data-driven Factory The next BriefingsDirect Internet of Things (IoT) technology trends interview explores how innovation is impacting modern factories and supply chains ...
Amazon to build new fulfillment center in Ottawa, create 600 jobs

Amazon to build new fulfillment center in Ottawa, create 600 jobs

(Reuters) - Amazon.com Inc said on Tuesday it planned to build a new fulfillment center in Canada’s capital Ottawa that would create more than 600 full-time jobs. The center, which is the company’s fifth in ...
Four Providers of Smart City Kiosks Named IDC Innovators

Four Providers of Smart City Kiosks Named IDC Innovators

FRAMINGHAM, Mass., July 11, 2018 – International Data Corporation (IDC) today published an IDC Innovators report profiling four providers that are considered key emerging vendors in the Smart City kiosks market. The four companies named as ...
New Rackspace Application Services for Databases: “Any Database, Any Deployment, Any Service Level”

New Rackspace Application Services for Databases: “Any Database, Any Deployment, Any Service Level”

Rackspace has been offering enterprise-class database services for more than a decade. Today, we’re taking that service to a new level, with our “any database, any deployment, any service level” approach, which meets customers wherever ...