SlideShare a Scribd company logo
Deployment of Biometrics and Password
- NIST Digital Identity Guidelines 800 63B
It seems that the biometrics guidelinesin 800 63B (*1) are basicallymade
of two key segments.
(A) Biometrics now needs to be used together with a physical factor
(something you have) 'IN SERIES' in view of its coherent vulnerabilities (*2)
(B) When users get falsely rejected, ‘a physical authenticator PLUS <other
biometrics OR password>' could be deployed 'IN SERIES' (*3)
And, (A) and (B) are to be deployed 'IN PARALLEL' (*3). Its collective
vulnerability is the sum of vulnerability of (A = biometrics PLUS physical
authenticator) and that of (B = physical authenticator PLUS <other
biometrics OR password>), which is larger than A alone and also B alone.
As such, we could assume that, in NIST guidelines, a physical
authenticator is the star, with biometrics and password playing an
auxiliaryinterchangeable role.
It is good to see that NIST no longer allows the use of biometrics with only a
fallback password used ‘IN PARALLEL’. But it is worrying that NIST still
allows a route of passwordless authentication with no user's volition, which
could make a threat to democracy. The principle of citizen's placing their
sensitive information under their own control could be eroded. The route of
allowing unconscious people to get authenticated unknowingly should be
precluded.
Incidentally, I am still not certain what users are expected to do when they
forget to carry the physical authenticator with them. It would certainly be
safe to simply lock out, though very inconvenient. Should a route of fallback
password (used 'IN PARALLEL') be provided, the overall security would be
lower than that of the fallback password alone, rendering the costs of
involving physical authenticators and biometrics utterly meaningless.
And, more fundamentally, when 'a physical authenticator PLUS password'
is less complicated, less costly and more secure than 'a physical
authenticator PLUS <password OR biometrics>', I wonder where there is a
merit of involving the problem-ridden biometrics. We could not forget that
the password is crucially required in any case.
Readers’opinions on this hypothesis would be very much appreciated.
………………………………..
*1 Digital Identity Guidelines https://pages.nist.gov/800-63-3/sp800-63b.html
*2 Clause 5.2.3 reads "Biometrics SHALL be used only as part of multi-factor
authentication with a physical authenticator (something you have)."
*3 and also “Once that limit (of rejection) has been reached, the biometric authenticator
SHALL either:
• Impose a delay of at least 30 seconds before the next attempt, increasing
exponentially with each successive attempt (e.g., 1 minute before the following failed
attempt, 2 minutes before the second following attempt), or
• Disable the biometric user authentication and offer another factor (e.g., a different
biometric modality or a PIN/Passcode if it is not already a required factor) if such an
alternative method is already available.”
<Remarks>
‘in series’ deployment = both to pass, And/Conjunction
‘in parallel’ deployment = either to pass, Or/Disjunction
< Related Articles >
- P3 Clues to Unravelling Conundrums - Biometrics deployed ‘in parallel’
- P5 Truth does not matter in infosec?
- P6 iPhone X Face ID - What FAR means when it does not come with the corresponding FRR?
- P7 Mitigation of Password Predicament
- P8 Democracy would be dead where the password is killed
P9 Mix up “Unique” with “Secret” and confuse “Identification” with “Authentication”
Clues to Unravelling Conundrums
- Biometrics deployed ‘in parallel’ as against ‘in series’
In my earlier writing “Truth does not matter in infosec?” I wrote as follows:
--------
So long as the biometrics is backed up by a fallback password, irrespective of which are more
accurate than the others, its security is lower than that of a password-only authentication. Then, we
have to wonder why and how the biometrics has been touted as a security-enhancing tool for so long,
with so many security professionals being silent about the fact.
---------
It appears that we may have got some clues to this conundrum. We had a chance to look at a
document produced by NIAP (National Information Assurance Partnership), in which ‘hybrid
biometrics authentication’ was discussed.
The biometrics advocates got a NIAP committee to positively evaluate the hybrid (two-factor)
deployment of biometrics and passwords by just talking about the 'in series' deployments. Then, the
concept that the hybrid biometrics authentications provide good security was solidly established
with authority. There may have been some more similar cases.
On the other hand, a number of biometrics vendors put on the market the biometrics products, which
are deployed 'in parallel', without referring¸ knowingly or unknowingly, to the difference between the
'in parallel' deployments and the 'in series' deployments. I would not like to suspect that there were
choreographers for it. I assume that it might well have happened due to lack of good communication
and misunderstanding among the people concerned.
The outcome was a number of misguided security professionals and tech media spreading the
misguiding information in a gigantic scale. We are now witnessing such a worrying situation that a
number of financial institutions are adopting the 'in parallel' hybrid biometrics for the applications
for which they say they require the level of security higher than the password. It is defeating the
purpose.
Well, I am not happy with this uncomfortable hypothesis. I would appreciate it if someone could let
me know the presence of different materials that might lead us to different observations.
I would also welcome any information on whether the publicized FAR and FRR are empirical or
theoretical and how they are measured, monitored or calculated.
<Remarks>
‘in series’ deployment = both to pass, And/Conjunction
‘in parallel’ deployment = either to pass, Or/Disjunction
Truth does not matter in infosec?
Tech media seem busy arguing which biometrics is better than the others. But it is all
nonsense from security’s point of view. Instead we should ask why security-lowering
measures have been touted as security-enhancing solutions.
Because of its inherent characteristics, biometrics depends on a fallback means in case
of false rejection. In physical security, it could be handled by personnel in charge other
than the user. In cybersecurity, however, it needs to be handled by the user themselves,
in most cases by way of a password that the user themselves needs to feed.
So long as the biometrics is backed up by a fallback password, irrespective of which are
more accurate than the others, its security is lower than that of a password-only
authentication as illustrated in this video. https://youtu.be/wuhB5vxKYlg
Then, we have to wonder why and how the biometrics has been touted as a
security-enhancing tool for so long, with so many security professionals being silent
about the fact.
There could be various explanations – from agnotology, neuroscience, psychology,
sociology, behavioral economics and so on. This phenomenon will perhaps be found to
have provided an excitingly rich material for a number of scientists and researchers in
those fields.
Summary of the video
> >
iPhone X Face ID
What FAR means when it does not come with the corresponding FRR?
Answer: It means nothing.
According to some tech media¸the FAR (false acceptance rate) of iPhone X Face ID is
said to be one millionth, which might be viewed as considerably better than the reported
one 50,000th of Touch ID.
It is not the case, however. The fact is that which is better or worse can by no means be
decided when the corresponding FRR (false rejection rates) of Face ID and Touch ID,
which are in the trade-off relation with FAR, are not known. This crucial observation is
seldom reported by major tech media. It is really sad to see the misguided tech media
spreading the misguiding information in a huge scale.
The only meaningful fact that we can logically get confirmed by the trade-off between
FAR and FRR is that the biometrics deployed with a password as a fallback means
against false rejection would only provide the level of security lower than that of a
password-only authentication.
Face ID, which brings down security as such, could be recommended only for those who
want better convenience, as in the case of Touch ID. If recommended for better security,
it would only get criminals and tyrants delighted.
Security professionals are expected to speak up.
30-second video - https://youtu.be/7UAgtPtmUbk
Mitigation of Password Predicament
This article talks about the old and new NIST password guidelines.
https://www.theverge.com/2017/8/7/16107966/password-tips-bill-burr-regrets-advice-nit
s-cybersecurity
It is nice to see repealed the odd recommendations like the complicated hard-to-recall
passwords which would result in reusing the same password across many accounts and
the regular password change which would result in using the easiest-to-guess
passwords. It is not nice, however, to see ‘passphrase’ and ‘password manager’ being
touted so naively. Caveats should come with these recommendations.
Passphrase: It could be longer and yet easier to remember but it does not necessarily
mean a higher entropy despite the troubles of tiresome typing. It is generally made of
known words that are just vulnerable to automated dictionary attacks.
The cartoon shown in this Verge article reads that a 44-bits entropy is hard to guess. It
may be extremely hard for humans to guess, but it would be so easy a prey for criminals
who possess the automated attack software with the intelligent dictionaries.
Password Manager: It remembers all my passwords when un-hacked and loses all my
passwords to criminals when hacked. It should be operated in a decentralized
formation or should be considered mainly for low-security accounts, not for the
high-security business that should desirably be protected by all different strong
passwords unique to each account.
Then, what else can we do? Our proposition.is “Intuitive Passwords: Passwords to
Succeed Passwords”
http://virtual-strategy.com/2017/04/14/intuitive-passwords-passwords-to-succeed-passw
ords/
Democracy would be dead where the password is killed
Some security people are advocating that the password should be killed dead. I wonder
if they are aware of what they mean by what they say. A society where login without
users’ volition is allowed would be the society where democracy is dead. It’s a tyrant’s
utopia.
We know that biometrics, which relies on a fallback password, can by no means be an
alternative to the password, that the password is an indispensable factor for
multi-factor schemes and that the security of password managers and single-sign-on
schemes needs to hinge on the reliability of the password.
The password (memorized secret) is absolutely necessary. Don’t let it be killed. Don’t
accept any form of passwordless login.
<Reference>
Slide: Password Fatigue and Expanded Password System
http://www.slideshare.net/HitoshiKokumai/password-fatigue-and-expanded-password-s
ystem
Article (7-page): Intuitive Password – passwords succeeding passwords
https://www.slideshare.net/HitoshiKokumai/intuitive-passwords-passwords-succeeding-
passwords
Mix up “Unique” with “Secret” and
we would confuse “Identification” with “Authentication”
Biometrics follows “unique” features of individuals’ bodies and behaviors. It means
that it could be well used when deployed for identification of individuals who may be
conscious or unconscious, alive or dead. Due respect could be paid to biometrics in this
sphere.
Being “unique” is different from being “secret”, however. It would be a misuse of
biometrics if deployed for security of the identity authentication of individuals.
Confusing “Identification” with “Authentication”, we would be building a sandcastle in
which people are trapped in a nefarious false sense of security. However gigantic and
grandiose it may look, the sandcastle could melt away altogether when we have a heavy
storm.
And, the storm will come. The question is not “if”, but just “how soon”.
< Videos >
Turn off biometrics where security matters (30 seconds)
https://youtu.be/7UAgtPtmUbk
Biometrics in Cyber Space - "below-one" factor authentication
https://youtu.be/wuhB5vxKYlg
Six Reasons to Believe Biometrics Don't Ruin Cyber Security
https://youtu.be/lODTiO2k8ws
Password-free Life - Utopia or Dystopia? (30 seconds)
https://youtu.be/UJDBZpX1a0U
Password Predicament and Expanded Password System
https://youtu.be/-KEE2VdDnY0

More Related Content

PDF
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
PDF
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
PDF
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
DOCX
61370436 main-case-study
PDF
IRJET- Honeywords: A New Approach for Enhancing Security
PDF
Big Data Dectives
PDF
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
PDF
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
61370436 main-case-study
IRJET- Honeywords: A New Approach for Enhancing Security
Big Data Dectives
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...

What's hot (18)

PDF
Certified Secure - Ineffective Detection Systems
PDF
Two factor authentication-in_your_network_e_guide
DOCX
Do biometric gun safes work
PDF
finalreportsoarnew (1).pdf
PDF
firozreport.pdf
PDF
M-Pass: Web Authentication Protocol
PPTX
Gdpr encryption and tokenization
DOCX
Backup of FinalExam-EssayQ-Mon
PDF
Layer8 exploitation: Lock'n Load Target
PDF
Ce hv8 module 14 sql injection
PDF
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
PDF
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
PPTX
Green Security
PPTX
SCIT Labs - intrusion tolerant systems
PDF
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
PPTX
Internet transaction and communication security
PDF
Issa chicago next generation tokenization ulf mattsson apr 2011
DOCX
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Certified Secure - Ineffective Detection Systems
Two factor authentication-in_your_network_e_guide
Do biometric gun safes work
finalreportsoarnew (1).pdf
firozreport.pdf
M-Pass: Web Authentication Protocol
Gdpr encryption and tokenization
Backup of FinalExam-EssayQ-Mon
Layer8 exploitation: Lock'n Load Target
Ce hv8 module 14 sql injection
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
Green Security
SCIT Labs - intrusion tolerant systems
Ricardo Mendez, Technical Director Europe ,Samsung NEXT - Identity, Privacy a...
Internet transaction and communication security
Issa chicago next generation tokenization ulf mattsson apr 2011
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Ad

Similar to Deployment of Biometrics & Password - NIST63B (20)

DOCX
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
PDF
Brafton White Paper Example
DOCX
Biometrics
PDF
Multi factor authentication issa0415-x9
PDF
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
PDF
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
PDF
Two factor authentication
PDF
Two factor authentication
PDF
8.biometric security
PPTX
Biometrics security
DOCX
Final report
PPTX
Bi ometric security
PDF
Making User Authentication More Usable
DOCX
More Issues on Digital Identity (24Feb2023)
PDF
Sonic WALL Secure Wireless Network Integrated Solutions Guide 1st Edition Joe...
PDF
Enterprise Biometric Solution
PDF
Three types of Authentications
PDF
Behavioural biometrics and cognitive security authentication comparison study
PDF
Two-factor authentication- A sample writing _Zaman
PPTX
Leveraging AI for Advanced Facial and Biometric Authentication
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Brafton White Paper Example
Biometrics
Multi factor authentication issa0415-x9
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Two factor authentication
Two factor authentication
8.biometric security
Biometrics security
Final report
Bi ometric security
Making User Authentication More Usable
More Issues on Digital Identity (24Feb2023)
Sonic WALL Secure Wireless Network Integrated Solutions Guide 1st Edition Joe...
Enterprise Biometric Solution
Three types of Authentications
Behavioural biometrics and cognitive security authentication comparison study
Two-factor authentication- A sample writing _Zaman
Leveraging AI for Advanced Facial and Biometric Authentication
Ad

More from Hitoshi Kokumai (13)

PPTX
Image-to-Code Converter 31July2023.pptx
DOCX
Fend Off Cyberattack with Episodic Memory (24Feb2023)
PDF
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
PDF
Fend Off Cybercrime with Episodic Memory
DOCX
Bring healthy second life to legacy password system
DOCX
Intriguing Evlolution from One to Two and Back to One
DOCX
Cyber Predicament by Text-Only Password Systems
PDF
Updated: Presentation with Scripts at CIW2018
DOCX
Presentation with Scripts at CIWEU2018
PPTX
Updated: Identity Assurance by Our Own Volition and Memory
DOCX
Help unravel the conundrum over NIST authentication guideline
PPT
Business Dimension of Expanded Password System
PPT
Expanded password system - Reliable Identity Assurance
Image-to-Code Converter 31July2023.pptx
Fend Off Cyberattack with Episodic Memory (24Feb2023)
Slide Share (Updated) - Fend Off Cybercrime with Episodic Memory 29Aug2022
Fend Off Cybercrime with Episodic Memory
Bring healthy second life to legacy password system
Intriguing Evlolution from One to Two and Back to One
Cyber Predicament by Text-Only Password Systems
Updated: Presentation with Scripts at CIW2018
Presentation with Scripts at CIWEU2018
Updated: Identity Assurance by Our Own Volition and Memory
Help unravel the conundrum over NIST authentication guideline
Business Dimension of Expanded Password System
Expanded password system - Reliable Identity Assurance

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
MIND Revenue Release Quarter 2 2025 Press Release
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Digital-Transformation-Roadmap-for-Companies.pptx
Big Data Technologies - Introduction.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Deployment of Biometrics & Password - NIST63B

  • 1. Deployment of Biometrics and Password - NIST Digital Identity Guidelines 800 63B It seems that the biometrics guidelinesin 800 63B (*1) are basicallymade of two key segments. (A) Biometrics now needs to be used together with a physical factor (something you have) 'IN SERIES' in view of its coherent vulnerabilities (*2) (B) When users get falsely rejected, ‘a physical authenticator PLUS <other biometrics OR password>' could be deployed 'IN SERIES' (*3) And, (A) and (B) are to be deployed 'IN PARALLEL' (*3). Its collective vulnerability is the sum of vulnerability of (A = biometrics PLUS physical authenticator) and that of (B = physical authenticator PLUS <other biometrics OR password>), which is larger than A alone and also B alone. As such, we could assume that, in NIST guidelines, a physical authenticator is the star, with biometrics and password playing an auxiliaryinterchangeable role. It is good to see that NIST no longer allows the use of biometrics with only a fallback password used ‘IN PARALLEL’. But it is worrying that NIST still allows a route of passwordless authentication with no user's volition, which could make a threat to democracy. The principle of citizen's placing their sensitive information under their own control could be eroded. The route of allowing unconscious people to get authenticated unknowingly should be precluded. Incidentally, I am still not certain what users are expected to do when they forget to carry the physical authenticator with them. It would certainly be safe to simply lock out, though very inconvenient. Should a route of fallback password (used 'IN PARALLEL') be provided, the overall security would be lower than that of the fallback password alone, rendering the costs of involving physical authenticators and biometrics utterly meaningless.
  • 2. And, more fundamentally, when 'a physical authenticator PLUS password' is less complicated, less costly and more secure than 'a physical authenticator PLUS <password OR biometrics>', I wonder where there is a merit of involving the problem-ridden biometrics. We could not forget that the password is crucially required in any case. Readers’opinions on this hypothesis would be very much appreciated. ……………………………….. *1 Digital Identity Guidelines https://pages.nist.gov/800-63-3/sp800-63b.html *2 Clause 5.2.3 reads "Biometrics SHALL be used only as part of multi-factor authentication with a physical authenticator (something you have)." *3 and also “Once that limit (of rejection) has been reached, the biometric authenticator SHALL either: • Impose a delay of at least 30 seconds before the next attempt, increasing exponentially with each successive attempt (e.g., 1 minute before the following failed attempt, 2 minutes before the second following attempt), or • Disable the biometric user authentication and offer another factor (e.g., a different biometric modality or a PIN/Passcode if it is not already a required factor) if such an alternative method is already available.” <Remarks> ‘in series’ deployment = both to pass, And/Conjunction ‘in parallel’ deployment = either to pass, Or/Disjunction < Related Articles > - P3 Clues to Unravelling Conundrums - Biometrics deployed ‘in parallel’ - P5 Truth does not matter in infosec? - P6 iPhone X Face ID - What FAR means when it does not come with the corresponding FRR? - P7 Mitigation of Password Predicament - P8 Democracy would be dead where the password is killed P9 Mix up “Unique” with “Secret” and confuse “Identification” with “Authentication”
  • 3. Clues to Unravelling Conundrums - Biometrics deployed ‘in parallel’ as against ‘in series’ In my earlier writing “Truth does not matter in infosec?” I wrote as follows: -------- So long as the biometrics is backed up by a fallback password, irrespective of which are more accurate than the others, its security is lower than that of a password-only authentication. Then, we have to wonder why and how the biometrics has been touted as a security-enhancing tool for so long, with so many security professionals being silent about the fact. --------- It appears that we may have got some clues to this conundrum. We had a chance to look at a document produced by NIAP (National Information Assurance Partnership), in which ‘hybrid biometrics authentication’ was discussed. The biometrics advocates got a NIAP committee to positively evaluate the hybrid (two-factor) deployment of biometrics and passwords by just talking about the 'in series' deployments. Then, the concept that the hybrid biometrics authentications provide good security was solidly established with authority. There may have been some more similar cases. On the other hand, a number of biometrics vendors put on the market the biometrics products, which are deployed 'in parallel', without referring¸ knowingly or unknowingly, to the difference between the 'in parallel' deployments and the 'in series' deployments. I would not like to suspect that there were choreographers for it. I assume that it might well have happened due to lack of good communication and misunderstanding among the people concerned. The outcome was a number of misguided security professionals and tech media spreading the misguiding information in a gigantic scale. We are now witnessing such a worrying situation that a number of financial institutions are adopting the 'in parallel' hybrid biometrics for the applications for which they say they require the level of security higher than the password. It is defeating the purpose.
  • 4. Well, I am not happy with this uncomfortable hypothesis. I would appreciate it if someone could let me know the presence of different materials that might lead us to different observations. I would also welcome any information on whether the publicized FAR and FRR are empirical or theoretical and how they are measured, monitored or calculated. <Remarks> ‘in series’ deployment = both to pass, And/Conjunction ‘in parallel’ deployment = either to pass, Or/Disjunction
  • 5. Truth does not matter in infosec? Tech media seem busy arguing which biometrics is better than the others. But it is all nonsense from security’s point of view. Instead we should ask why security-lowering measures have been touted as security-enhancing solutions. Because of its inherent characteristics, biometrics depends on a fallback means in case of false rejection. In physical security, it could be handled by personnel in charge other than the user. In cybersecurity, however, it needs to be handled by the user themselves, in most cases by way of a password that the user themselves needs to feed. So long as the biometrics is backed up by a fallback password, irrespective of which are more accurate than the others, its security is lower than that of a password-only authentication as illustrated in this video. https://youtu.be/wuhB5vxKYlg Then, we have to wonder why and how the biometrics has been touted as a security-enhancing tool for so long, with so many security professionals being silent about the fact. There could be various explanations – from agnotology, neuroscience, psychology, sociology, behavioral economics and so on. This phenomenon will perhaps be found to have provided an excitingly rich material for a number of scientists and researchers in those fields. Summary of the video > >
  • 6. iPhone X Face ID What FAR means when it does not come with the corresponding FRR? Answer: It means nothing. According to some tech media¸the FAR (false acceptance rate) of iPhone X Face ID is said to be one millionth, which might be viewed as considerably better than the reported one 50,000th of Touch ID. It is not the case, however. The fact is that which is better or worse can by no means be decided when the corresponding FRR (false rejection rates) of Face ID and Touch ID, which are in the trade-off relation with FAR, are not known. This crucial observation is seldom reported by major tech media. It is really sad to see the misguided tech media spreading the misguiding information in a huge scale. The only meaningful fact that we can logically get confirmed by the trade-off between FAR and FRR is that the biometrics deployed with a password as a fallback means against false rejection would only provide the level of security lower than that of a password-only authentication. Face ID, which brings down security as such, could be recommended only for those who want better convenience, as in the case of Touch ID. If recommended for better security, it would only get criminals and tyrants delighted. Security professionals are expected to speak up. 30-second video - https://youtu.be/7UAgtPtmUbk
  • 7. Mitigation of Password Predicament This article talks about the old and new NIST password guidelines. https://www.theverge.com/2017/8/7/16107966/password-tips-bill-burr-regrets-advice-nit s-cybersecurity It is nice to see repealed the odd recommendations like the complicated hard-to-recall passwords which would result in reusing the same password across many accounts and the regular password change which would result in using the easiest-to-guess passwords. It is not nice, however, to see ‘passphrase’ and ‘password manager’ being touted so naively. Caveats should come with these recommendations. Passphrase: It could be longer and yet easier to remember but it does not necessarily mean a higher entropy despite the troubles of tiresome typing. It is generally made of known words that are just vulnerable to automated dictionary attacks. The cartoon shown in this Verge article reads that a 44-bits entropy is hard to guess. It may be extremely hard for humans to guess, but it would be so easy a prey for criminals who possess the automated attack software with the intelligent dictionaries. Password Manager: It remembers all my passwords when un-hacked and loses all my passwords to criminals when hacked. It should be operated in a decentralized formation or should be considered mainly for low-security accounts, not for the high-security business that should desirably be protected by all different strong passwords unique to each account. Then, what else can we do? Our proposition.is “Intuitive Passwords: Passwords to Succeed Passwords” http://virtual-strategy.com/2017/04/14/intuitive-passwords-passwords-to-succeed-passw ords/
  • 8. Democracy would be dead where the password is killed Some security people are advocating that the password should be killed dead. I wonder if they are aware of what they mean by what they say. A society where login without users’ volition is allowed would be the society where democracy is dead. It’s a tyrant’s utopia. We know that biometrics, which relies on a fallback password, can by no means be an alternative to the password, that the password is an indispensable factor for multi-factor schemes and that the security of password managers and single-sign-on schemes needs to hinge on the reliability of the password. The password (memorized secret) is absolutely necessary. Don’t let it be killed. Don’t accept any form of passwordless login. <Reference> Slide: Password Fatigue and Expanded Password System http://www.slideshare.net/HitoshiKokumai/password-fatigue-and-expanded-password-s ystem Article (7-page): Intuitive Password – passwords succeeding passwords https://www.slideshare.net/HitoshiKokumai/intuitive-passwords-passwords-succeeding- passwords
  • 9. Mix up “Unique” with “Secret” and we would confuse “Identification” with “Authentication” Biometrics follows “unique” features of individuals’ bodies and behaviors. It means that it could be well used when deployed for identification of individuals who may be conscious or unconscious, alive or dead. Due respect could be paid to biometrics in this sphere. Being “unique” is different from being “secret”, however. It would be a misuse of biometrics if deployed for security of the identity authentication of individuals. Confusing “Identification” with “Authentication”, we would be building a sandcastle in which people are trapped in a nefarious false sense of security. However gigantic and grandiose it may look, the sandcastle could melt away altogether when we have a heavy storm. And, the storm will come. The question is not “if”, but just “how soon”. < Videos > Turn off biometrics where security matters (30 seconds) https://youtu.be/7UAgtPtmUbk Biometrics in Cyber Space - "below-one" factor authentication https://youtu.be/wuhB5vxKYlg Six Reasons to Believe Biometrics Don't Ruin Cyber Security https://youtu.be/lODTiO2k8ws Password-free Life - Utopia or Dystopia? (30 seconds) https://youtu.be/UJDBZpX1a0U Password Predicament and Expanded Password System https://youtu.be/-KEE2VdDnY0