Four Puzzling Issues of Identity Authentication

Four Puzzling Issues of Identity Authentication

– Takeaways from Consumer Identity World USA 2018 –


The so-called password-less authentication, if implemented literally, would lead us to a world where we are deprived of the chances and means to get our volition confirmed in having our identity authenticated. It would be a 1984-like world. The values of democratic societies are not compatible.

Some people allege that passwords can and will be eliminated by biometrics or PIN. But logic tells that it can never happen because the former requires a password/PIN as a fallback means and the latter is no more than the weakest form of numbers-only password.

Various debates over ‘password-less’ or ‘beyond-password’ authentications only make it clear that the solution to the password predicament could be found only inside the family of broadly-defined passwords.

Four Puzzling Issues

In our earlier article we referred to Consumer Identity World USA 2018, which the writer participated as both a speaker and a panel, making the presentation of ‘Identity Assurance by Our Own Volition and Memory’..

We had noticed that there were strong voices proposing:

  1. Password-less Authentication
  2. Use of PIN to eliminate passwords
  3. Biometrics in two/multi-factor authentication for better security
  4. Advantage of physical tokens as against one time codes by SMS

What puzzles us are:

  1. Doesn’t ‘Password-less’ mean ‘Volition-less’?
  2. Isn’t ‘PIN’ the weakest form of numbers-only passwords?
  3. Isn’t biometrics deployed with a fallback password ‘in parallel’, not ‘in series’?
  4. What if we have dozens of accounts to protect?

Below are a few of our observations

  1. Password-less Authentication:  The term of ‘password’ is poly-semantic and context-dependent. So is ‘password-less’. If ‘password-less authentication’ means ‘authentication without depending solely on hard-to-manage text passwords, we would be generally agreeable.

If, however, it means ‘authentication without what we remember altogether’, we must be against it. If implemented literally, it would lead us to a world where we are no longer allowed to get our volition confirmed in our own identity assurance. We call such a world ‘Dystopia’

  1. PIN as against Passwords:  If PIN or PINCODE, which is the weakest form of numbers-only password, had the power to kill the password, a small sedan should be able to kill the automobile.

Advocates of this idea seem to claim that a PIN is stronger than a password when it is linked to a device versus a password which is not linked to a device.

  1. Biometrics in two/multi-factor authentications:  All the factors of multi-factor schemes must be deployed ‘in-series’, not ‘in-parallel’. When two factors are deployed in-parallel, what is achieved is better convenience whereas security is brought down.

In reality biometrics is usually deployed with a password as a fallback means against false rejection, and biometrics and fallback passwords are used in-parallel, not in-series. This means that biometrics brings down the security of the password that was provided. It’s incompetent to recommend biometrics for higher level of security.

  1. Advantage of physical tokens:  It is said that using physical tokens is more secure than using phones for receiving one time code by SMS. If this is the case, the use of physical tokens brings its own headache. What shall we do if we have dozens of accounts that require the protection by two/multi-factor schemes?

Carrying around dozens of physical tokens? Re-using the same tokens across multiple accounts? The former would be too cumbersome and would too easily attract the attention of bad guys, while the latter would be very convenient but bring the likes of a single point of failure.

What can we do?

  1. Password-less Authentication: A secure and yet stress-free means of democracy-compatible identity authentication is proposed. It is the Expanded Password System that accepts both images and characters. It is now acknowledged as ‘Draft Proposal’ for OASIS Open Projects.
  2. PIN to eliminate passwords:  We could simply forget it.
  3. Biometrics in two/multi-factor authentication:  Biometrics could be recommended for better convenience, but must not be recommended where security matters.
  4. Advantage of physical tokens:  We could think of two new possibilities – one for better convenience and one for better security.

The former handles two different types of passwords, one recalled volitionally and the one physically possessed. The latter  involves the images to which random numbers or characters are allocated and shown to the users through a mobile device. Users who recognize the registered images will feed the numbers or characters given to those images on a main device. We do not depend on the vulnerable one time code sent through SMS and a phone copes with dozens of accounts.

In part 2, we will discuss some of the other related issues pertaining to password authenticity…

By Hitoshi Kokumai

Mark Ardito
OPEX is the new battleground I recently wrote in CloudTweaks about how cloud is forcing CIOs to work more closely with their C-suite colleagues to sell the benefits and its role as a business driver ...
Martin Mendelsohn
The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Gilad David Maayan
What is SASE (Secure Access Service Edge)? SASE (Secure Access Service Edge) is a term coined by Gartner to refer to a new architecture for networking and security that combines both functions into a single, ...
John Peluso
Save Your Organization on Cloud Costs Organizations of all sizes are currently navigating their plans to avoid the recent surge in cyber-attacks and data breaches and preparing for unforeseen setbacks. Building a sensible backup and ...
Richard Duffy
Overcoming IT Infrastructure Disaster (Updated: 03.24.2023) One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for ...
David Discenza
Four Ways to Improve Cybersecurity (Updated: December 9th, 2022 ) Cyber-attacks on businesses have become common place. In fact, it’s estimated that a cyber-attack occurs every 39 seconds. Who are the targets of these attacks? ...
10 Leading Open Source Business Intelligence Tools
Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up the decision-making process. Open Source Business Intelligence Tools make it easier to have our raw ...
Maxim Melamedov
Trouble is Brewing Cloud Paradise - 2023 Will Determine Company's Long-Term Plans for Cloud Use The relationship between developers and the cloud was practically love at first sight. For years, migration to the cloud in ...