SlideShare a Scribd company logo
Consultants of Security Operations d.o.o. Sarajevo
Strong Authentication in Web Application
         “State of the Art 2012”


      Sylvain Maret / Digital Security Expert / OpenID Switzerland

                              @smaret
                      Version 1.01 / 22.11.2012
Who am I?
   •   Security Expert
        –   17 years of experience in ICT Security
        –   Principal Consultant at MARET Consulting
        –   Expert at Engineer School of Yverdon & Geneva University
        –   Swiss French Area delegate at OpenID Switzerland
        –   Co-founder Geneva Application Security Forum
        –   OWASP Member
        –   Author of the blog: la Citadelle Electronique
        –   http://ch.linkedin.com/in/smaret or @smaret
        –   http://www.slideshare.net/smaret


   •   Chosen field
        – AppSec & Digital Identity Security
Strong Authentication State of the Art 2012 / Sarajevo CSO
22 per minute……
Protection of digital identities: a
topical issue…




                         Strong AuthN
RSA FAILED ?
Strong Authentication State of the Art 2012 / Sarajevo CSO
«Digital identity is the cornerstone
of trust»




                 http://fr.wikipedia.org/wiki/Authentification_forte
Definition of strong authentication




          Strong Authentication on Wikipedia
Strong Authentication

 A new paradigm?
Which Strong Authentication
technology ?
Strong Authentication State of the Art 2012 / Sarajevo CSO
OTP   PKI (HW)   Biometry
    Strong
 authentication
  Encryption

Digital signature

Non repudiation

Strong link with
    the user
Strong Authentication
      with PKI
PKI: Digital Certificate
                           Hardware Token (Crypto PKI)
                              Strong Authentication
   Software Certificate
     (PKCS#12;PFX)
SSL/TLS Mutual Authentication :
how does it work?
                                  Validation
      CRL                         Authority
        or
   OCSP Request

                      Valid
                      Invalid
                      Unknown




                    SSL / TLS Mutual Authentication
                                                      Alice
       Web Server
Strong Authentication with
Biometry (Match on Card
technology)
   • A reader
      – Biometry
      – SmartCard




   • A card with chip
      – Technology MOC
      – Crypto Processor
         • PC/SC
         • PKCS#11
         • Digital certificate X509
Strong Authentication


         With


(O)ne (T)ime (P)assword
(O)ne (T)ime (P)assword
   • OTP Time Based    • Others:
     – Like SecurID
                         –   OTP via SMS
   • OTP Event Based     –   OTP via email
                         –   Biometry and OTP
                         –   Phone
   • OTP Challenge
                         –   Bingo Card
     Response Based
                         –   Etc.
OTP T-B?
OTP E-B?
OTP C-R-B?


Crypto - 101
Crypto-101 / Time Based OTP
                           HASH Function


K=Secret Key / Seed

                                           OTP
 T=UTC Time




          ie = OTP(K,T) = Truncate(HMAC-SHA-1(K,T))
Crypto-101 / Event Based OTP

                           HASH Function

K=Secret Key / Seed


                                           OTP
  C = Counter




          ie = OTP(K,C) = Truncate(HMAC-SHA-1(K,C))
Crypto-101 / OTP Challenge
Response Based

                      HASH Function

K=Secret Key / Seed

                                        OTP
                                      Challenge
          nonce




                               ie:
Other[s] OTP technologies…



    OTP Via SMS




                    “Flicker code” Generator Software
                          that converts already
                           encrypted data into
                         optical screen animation
How to Store and
   Generate
my Secret Key ?

   A Token !
OTP Token: Software vs Hardware ?
Software OTP for Smartphone




      http://itunes.apple.com/us/app/iotp/id328973960
Where are[is] the seed ?
Strong Authentication State of the Art 2012 / Sarajevo CSO
Seed generation & distribution ?
Still a good model ?
                       K1


   Threat                    Editor / Vendor
   Agent
   (APT)                     Secret Key are[is]
                            generated on promise




            K1                        K1
                                            K1
TokenCode
New Standards

     &
Open Source
Technologies accessible to
everyone 
   • Initiative for Open AuTHentication (OATH)
      –   HOTP
      –   TOTP
      –   OCRA
      –   Etc.


   • Mobile OTP
      – (Use MD5 …..)
Initiative for Open AuTHentication
(OATH)
   • HOTP
                                • Token Identifier
     – Event Based OTP
                                  Specification
     – RFC 4226

                                • IETF KeyProv Working
   • TOTP                         Group
     – Time Based OTP                – PSKC - Portable Symmetric
                                       Key Container, RFC 6030
     – Draft IETF Version 8
                                     – DSKPP - Dynamic
                                       Symmetric Key Provisioning
                                       Protocol, RFC 6063
   • OCRA
     – Challenge/Response OTP • And more !
     – Draft IETF Version 13
                              http://www.openauthentication.org/specifications
(R)isk

(B)ased

(A)uthentication
RBA (Risk-Based Authentication)
= Behavior Model
Use OATH-HOTP & TOTP
http://code.google.com/p/google-authenticator/
Strong Authentication State of the Art 2012 / Sarajevo CSO
Integration with
web application
Web application: basic
authentication model
Web application: Strong
Authentication Implementation
Blueprint
“Shielding" approach: perimetric
authentication using Reverse
Proxy / WAF
Module/Agent-based approach
API/SDK based approach
ICAM:

a changing paradigm

on Strong Authentication
Federation of identity approach a
     change of paradigm:

using IDP for Authentication and
     Strong Authentication
Identity Provider
SAML, OpenID, etc
Strong Authentication
Strong Authentication and
Application Security


             &

   Application Security
Threat Modeling

“detecting web application

threats before coding”
Questions ?
Resources on Internet 1/2
    •   http://motp.sourceforge.net/
    •   http://www.clavid.ch/otp
    •   http://code.google.com/p/mod-authn-otp/
    •   http://www.multiotp.net/
    •   http://www.openauthentication.org/
    •   http://wiki.openid.net/
    •   http://www.citadelle-electronique.net/
    •   http://code.google.com/p/mod-authn-otp/
Resources on Internet 2/2
    •   http://rcdevs.com/products/openotp/
    •   https://github.com/adulau/paper-token
    •   http://www.yubico.com/yubikey
    •   http://code.google.com/p/mod-authn-otp/
    •   http://www.nongnu.org/oath-toolkit/
    •   http://www.nongnu.org/oath-toolkit/
    •   http://www.gpaterno.com/publications/2010/du
        blin_ossbarcamp_2010_otp_with_oss.pdf

More Related Content

PDF
Strong Authentication in Web Application #SCS III
PDF
Demystifying Apple 'Pie' & TouchID
PDF
NIST SP 800-63C #idcon vol.22
PDF
PKI Industry growth in Bangladesh
PPT
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
PPTX
How to do Cryptography right in Android Part One
PPTX
How to do right cryptography in android part 3 / Gated Authentication reviewed
PPTX
Certificate pinning in android applications
Strong Authentication in Web Application #SCS III
Demystifying Apple 'Pie' & TouchID
NIST SP 800-63C #idcon vol.22
PKI Industry growth in Bangladesh
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
How to do Cryptography right in Android Part One
How to do right cryptography in android part 3 / Gated Authentication reviewed
Certificate pinning in android applications

What's hot (10)

PDF
PKI Interoperability
PPTX
NextGenPSD2 OAuth SCA Mode Security Recommendations
PDF
Gtb Dlp Suite Presentation
PDF
The Belgian E Id Hacker Vs Developer
PDF
Pki and OpenSSL
PPT
Implementing Public-Key-Infrastructures
PDF
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
PPTX
How to do Cryptography right in Android Part Two
PPTX
IoT Agents (Introduction)
PPT
Marco Casassa Mont: Pki overview
PKI Interoperability
NextGenPSD2 OAuth SCA Mode Security Recommendations
Gtb Dlp Suite Presentation
The Belgian E Id Hacker Vs Developer
Pki and OpenSSL
Implementing Public-Key-Infrastructures
Case VC+: Como tornar seguro um aplicativo mobile payment sem penalizar a exp...
How to do Cryptography right in Android Part Two
IoT Agents (Introduction)
Marco Casassa Mont: Pki overview
Ad

Viewers also liked (20)

PPTX
Retour d'expérience sur le déploiement de biométrie à grande échelle
PDF
Renaissance PKI / Séminaire Clusis 2003
PDF
Antivirus : une technologie obsolète?
PPT
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
PPT
Strong Authentication with PKI
PDF
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
PPTX
OpenID et Facebook
PDF
Geneva Application Security Forum: Vers une authentification plus forte dans ...
PDF
Usurper une identité? Impossible avec la biométrie!
PDF
Geneva Application Security Forum 2010
PDF
Strong Authentication in Web Application / ConFoo.ca 2011
PPTX
Geneva Application Security Forum: Vers une authentification plus forte dans ...
PDF
Comment concilier facilité d'utilisation et securite?
PDF
Pki Training V1.5
PDF
La Citadelle Electronique
PPT
Ethical Hacking
PPT
Les Firewalls
PDF
Renaissance Pki Maret
PDF
Quelle technologie pour les accès distants sécurisés ?
PDF
Etude de cas Biométrie
Retour d'expérience sur le déploiement de biométrie à grande échelle
Renaissance PKI / Séminaire Clusis 2003
Antivirus : une technologie obsolète?
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
Strong Authentication with PKI
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
OpenID et Facebook
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Usurper une identité? Impossible avec la biométrie!
Geneva Application Security Forum 2010
Strong Authentication in Web Application / ConFoo.ca 2011
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Comment concilier facilité d'utilisation et securite?
Pki Training V1.5
La Citadelle Electronique
Ethical Hacking
Les Firewalls
Renaissance Pki Maret
Quelle technologie pour les accès distants sécurisés ?
Etude de cas Biométrie
Ad

Similar to Strong Authentication State of the Art 2012 / Sarajevo CSO (20)

PPT
10 1 otp all
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
SmartCard Forum 2011 - Evolution of authentication market
PDF
Creating OTP with free software
PDF
PDF
Assurity seminar 24 jan
PDF
TrustBearer - CTST 2009 - OpenID & Strong Authentication
PPT
Authentication Technologies
PPT
Authentication technologies
PDF
Two Factor Authentication Using Smartphone Generated One Time Password
PDF
Strong Authentication in Web Applications: State of the Art 2011
PDF
2FA and OTP
PPT
Security and Authentication at a Low Cost
PPTX
One Time Password - A two factor authentication system
PPTX
Access management
PDF
dna-identity-crisis-cloud-web
PDF
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
PDF
Over the Air 2011 Security Workshop
PDF
IRJET- Multi sharing Data using OTP
PDF
How to 2FA-enable Open Source Applications
10 1 otp all
Stronger/Multi-factor Authentication for Enterprise Applications
SmartCard Forum 2011 - Evolution of authentication market
Creating OTP with free software
Assurity seminar 24 jan
TrustBearer - CTST 2009 - OpenID & Strong Authentication
Authentication Technologies
Authentication technologies
Two Factor Authentication Using Smartphone Generated One Time Password
Strong Authentication in Web Applications: State of the Art 2011
2FA and OTP
Security and Authentication at a Low Cost
One Time Password - A two factor authentication system
Access management
dna-identity-crisis-cloud-web
ASFWS 2011: Harmonizing Identity and Privacy in Digital Identity and Authenti...
Over the Air 2011 Security Workshop
IRJET- Multi sharing Data using OTP
How to 2FA-enable Open Source Applications

More from Sylvain Maret (20)

PDF
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
PDF
factsheet_4g_critical_comm_en_vl
PDF
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
PDF
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
PDF
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
PDF
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
PDF
Threat Modeling / iPad
PPT
Authentication and strong authentication for Web Application
PDF
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
PPTX
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
PPTX
Digital identity trust & confidence
PDF
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
PDF
Geneva Application Security Forum: Vers une authentification plus forte dans ...
PDF
Geneva Application Security Forum: Vers une authentification plus forte dans ...
PDF
Corrélation d'évènements dans un environnement VoIP avec ExaProtect
PPTX
Protection Des Données avec la Biométrie Match On Card
PDF
Phishing Facebook Attack
PDF
Biométrie et Mobilité
PPTX
Comment Sécurisé son Identité Numérique
PPT
Cours Authentication Manager RSA
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
factsheet_4g_critical_comm_en_vl
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
Threat Modeling / iPad
Authentication and strong authentication for Web Application
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Digital identity trust & confidence
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Corrélation d'évènements dans un environnement VoIP avec ExaProtect
Protection Des Données avec la Biométrie Match On Card
Phishing Facebook Attack
Biométrie et Mobilité
Comment Sécurisé son Identité Numérique
Cours Authentication Manager RSA

Strong Authentication State of the Art 2012 / Sarajevo CSO