28
Why and how to implement strong authentication on the web? Patrick Duboys Product Marketing Manager Keynectis patrick . duboys @ keynectis .com

Why and how to implement strong authentication on the web cartes 2010 - patrick duboys signé

Embed Size (px)

Citation preview

Page 1: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Why and how to implement strong authentication on the web?

Patrick DuboysProduct Marketing Manager 

Keynectispatrick . duboys @ keynectis .com 

Page 2: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé
Page 3: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

The context

• Digital identity becomes a challenge: Internet users want to be recognized, to protect their identity in order to connect themselves in complete confidence and freedom

• Health data access requires control and traceability• Users and banks need by regulation strong authentication solutions to: – Protect sensitive transactions for online banking– Protect 3D Secure e‐commerce transactions

Page 4: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Authentication: Examples of usage

• Electronic Messaging• Extranet• Internet web sites• Social networking• E‐banking• Online Chat• Login on your PC• 3D Secure e‐payement

Page 5: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Weakness of passwords 

Page 6: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Login / password

• Same password for every account• Key loggers (Hardware or software)• Weak passwords• Brute force attack• Login Spoofing• Phishing• Shoulder surfing• Self‐service password reset• Man In the Middle

Page 7: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

“Password recovery”

Page 8: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Impact of Identity Theft on the web

• Cost for individuals• Cost for organizations• Cost for governments• Cost for the market• Psychological impact

Page 9: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Fraud growth on the Internet

Source: http://www.ic3.gov

YEAR RECEIVED COMPLAINTS LOSS IN DOLLARS (MILLION $)

2009 336,655  559.7

2008 275,284  265

2007 206,884  239.09

2006 207,492  198.44

2005 231,493  183.12

Page 10: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Decision process

• CSO• CIO• Marketing Manager• Financial Manager• Others

Page 11: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

What is « strong authentication »?

• Goal: Reduce Identity Fraud

Page 12: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

What to take into account?

• Level of security• User adoption• Total Cost of Ownership• Manageability• Mobility• Integration• Respect of standards• Level of services• Other value

Page 13: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Examples of risks on the Internet

• Man in the Middle• Man in the Browser• Phishing• Pharming• Spyware• Typo Squatting

Page 14: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Who is committed?

• Governments for their citizen (E‐Gov, etc.)• Organization such as the OECD• Organization such as the Federal Trade Commission• Companies such as Banks for their customers (Banque de France for example)

Page 15: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Some strong Authentication Solutions

• SMS One Time Password• One Time Password Token• Standard USB Key (such as K.Access®) • Cryptographic keys• CAP EMV (Banking Industry)• Crash Card• Etc.

Page 16: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

One Time Password ‐ Token

• Event based• Time based (a time‐based variable is used to create the OTP)

• Requires an “OTP server”• Requires to distribute Tokens• Token can be affected to other users

Page 17: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Using the SSL Standard for authentication

Page 18: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

SSL Standard

• “Internet Engineering Task Force” standard• Asymmetric Cryptography – X509 standard• Server Authentication – SSL V3• Client Authentication – SSL V3• Steady growth – Over 1,25 million SSL Server certificates +30% per annum

• Secure web servers, secure electronic messaging, etc.

Page 19: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

19

Electronic Certificate

• Signature

• Serial number

• Subject

• Issuing date

• Expiry date

• Signature from the Registration Authority

Page 20: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

20

Issuing certificates

1. Certificate Request

2. Authentication of requester

3. Approved Request4. Certificate

Certificate requester

Registration Authority

Organization

Trusted Third Party

Certification Authority

Page 21: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Registration Authority

• Process to register and validate individuals and organizations

• Certification Authority• Certification Policy• Life cycle of the certificate: registration, revocation, renewal, revocation lists, key escrow and recovery, etc. 

Page 22: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Opens new doors!

• Strong Authentication• Electronic Signature• Encryption• E‐Marketing• Next generation of business on the web

– Signature of contracts online– Etc.

Page 23: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Why a Software as a Service solution?

• Software as a Service– Certification Authority – CA Recognized in browsers– Audited processes– Managed by security experts– Cost per user per year– No need for a PKI, HSM, etc.

Page 24: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Level of trust

24

Level of validation Signature Authentication Encryption1: Just email Yes Yes Yes2: Scan documents sent electronically Yes Yes Yes3: Documents sent by post Yes Yes Yes4: With validation of the information Yes Yes Yes5: Face to face Yes Yes Yes

Just email : Low legal value

Face to face:High legal value

Page 25: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Form factor

25

Signature Authentication EncryptionCertificate on the user’s computer Yes Yes YesCertificate on a standard USB key / Or CD-ROM Yes Yes YesCertificate within a cryptographic key Yes Yes Yes

On the PC:Cost‐effective

Cryptographic key:Maximum security

USB key or Telephone: Mobility, strong security, usability, cost

Page 26: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Strong Authentication

Two factors Authentication: What I have: a USB key, a 

Smartphone, an iPod What I know: a PIN code

Page 27: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Demonstration

Page 28: Why and how to implement strong authentication on the web   cartes 2010 - patrick duboys signé

Thank you.

11‐13 rue René Jacques ‐ 92131 Issy‐les‐Moulineaux Cedex France+33 (0)1 55 64 22 00 ‐ www.keynectis.com