Authentication at Google:�Beyond Passwords and Towards Devices
Dirk Balfanz�
Cloud Identity Summit · June 2015 · San Diego
Bearer Tokens
|
Phishing |
Password�Sharing |
Network�Attacks |
Client�Compromise |
Server�Compromise |
Passwords |
! |
! |
! |
! |
! |
Cookies |
|
|
! |
! |
! |
Bearer Tokens
|
Phishing |
Password�Sharing |
Network�Attacks |
Client�Compromise |
Server�Compromise |
Passwords |
! |
! |
! |
! |
! |
Cookies |
|
|
! |
! |
! |
Crypto to the Rescue!
Password
Password
Password Reuse
Phishing
Interception
Crypto to the Rescue!
Test of User Presence
Public-Key�Crypto
Password Reuse
Phishing
Interception
Interlude: Smart Lock
Smart Lock for Android
Wearable
Trusted�Devices
Location
Trusted Voice
On-Body Detection
Smart Lock for Chromebook
Crypto to the Rescue!
Password Reuse
Phishing
Interception
Crypto-Based Logins
Crypto-Based Logins
password
password
password
password
Crypto-Based Logins: Coming Up
�Necessary first step : separate username & password input during login!
password
Crypto-Based Logins: Coming Up
password
�Use help of carrier: Mobile OpenID Connect �� (unsolved issues: trust in carriers, something-you-know/are as a 2nd factor)
You can help!
Use this pattern.
Test of User Presence
Public-Key�Crypto
FIDO-enable�your web site.
Test of User Presence
Public-Key�Crypto
Don’t ask for�passwords.
Test of User Presence
Public-Key�Crypto
Bind cryptographic�keys to biometrics�or screen locks.
Test of User Presence
Public-Key�Crypto
password
If you’re an MNO: Help us solve this use case!
Thanks!