1 / 25

CertAnon

CertAnon. The feasibility of an anonymous WAN authentication service Red Group CS410 March 1, 2007. Our Team. 3/1/2007 Red Group 2. Threatening News.

amy-weeks
Download Presentation

CertAnon

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CertAnon The feasibility of an anonymous WAN authentication service Red Group CS410 March 1, 2007

  2. Our Team 3/1/2007 Red Group 2

  3. Threatening News • 1/5/2007: In an Instant, Retirement Savings Vanish • 2/15/2007: Online Identity Stolen • 2/20/2007: Phishers Targeting MySpace • 2/23/2007: Free Wi-Fi scam hitting airports • 2/26/2007: Trojan Horse Designed to Steal Usernames and Passwords 3/1/2007 Red Group 3

  4. How About You? • How many online accounts do you have? • How many passwords do you have to remember? • How do you manage them? 3/1/2007 Red Group 4

  5. The Problem • Single-factor password authentication is easily compromised and endangers the security of online accounts. • Username/Password paradigm is insecure1 • Management of multiple strong passwords is difficult for individuals • Fraudulent online account access is increasing 1. http://www.schneier.com/crypto-gram-0503.html#2 3/1/2007 Red Group 5

  6. The Endangered Password • More online accounts = more passwords • Complexity of passwords is limited by the human factor2 • Vulnerability is enhanced by the technology factor • Dissemination is too easy • Once compromised, a password is no longer effective for authentication 2. http://www.schneier.com/blog/archives/2006/12/realworld_passw.html 3/1/2007 Red Group 6

  7. Going Phishing • Phishing sites are on the rise3 • Over 7 million phishing attempts per day 3. Anti-Phishing Working Group - http://www.antiphishing.org/ 3/1/2007 Red Group 7

  8. CertAnon - A New Proposal • Anonymous WAN authentication service • Used for any and all online accounts • Strong two-factor authentication • Limited information sharing • Partner with online businesses • Initial customers are Internet users 3/1/2007 Red Group 8

  9. Goal and Objectives • Build a WAN authentication service that permits customers to securely access all of their online accounts using a single access method • Build our website • Write software modules for partner sites • Develop testing portal • Install authentication servers • Distribute tokens • Beta-testing, then go live! 3/1/2007 Red Group 9

  10. What Would It Look Like? 3/1/2007 Red Group 10

  11. Two-factor Authentication4 • Something you know • A single PIN • Plus something you have • Hardware token generating pseudo-random numbers • Effectively changes your password every 60 seconds 4. RSA - http://www.rsasecurity.com/node.asp?id=1156 3/1/2007 Red Group 11

  12. 3/1/2007 Red Group 12

  13. Token Setup Process 3/1/2007 Red Group 13

  14. Account Setup Process 3/1/2007 Red Group 14

  15. Who is Our Customer? • Individual Internet User • Purchases CertAnon token for one-time fee of $50 • Obtaining a critical mass of customers makes CertAnon a must have for online vendors • Could give leverage to charge vendors in the future 3/1/2007 Red Group 15

  16. 5. Internet World Stats - http://www.internetworldstats.com/stats2.htm 6. Clickz.com - http://www.clickz.com/showPage.html?page=3481976#table 7. Clickz.com - http://www.clickz.com/showPage.html?page=3587781#table2 8. RSA Security Password Management Survey - http://www.rsa.com/products/SOM/whitepapers/PASSW_WP_0906.pdf About the Customer % 3/1/2007 Red Group 16

  17. Why Will The Customer Care? • Reduce/eliminate need for multiple passwords • Avoid password theft and unauthorized account access • No information stored on a card that can be lost • No password database to be hacked 3/1/2007 Red Group 17

  18. What’s in it for a business? • It’s free • No need to implement a costly proprietary solution • Improves security of customer base by moving more people away from passwords • Snaps into existing infrastructure with minimal development • Customers who don't switch will be unaffected 3/1/2007 Red Group 18

  19. Competition Matrix 3/1/2007 Red Group 19

  20. Cons • Still not perfectly secure • Token trouble • Forgotten • Broken • Lost or stolen • Inadequate for sight-impaired users 3/1/2007 Red Group 20

  21. Risks & Mitigation (1-Low to 5-High) 3/1/2007 Red Group 21

  22. Costs & Revenue *Based on sales of one million tokens 3/1/2007 Red Group 22

  23. Conclusion • Available, affordable, and proven technology • Targets a large and growing market • Benefits consumers and online businesses • Manageable project scope, scaleable product 3/1/2007 Red Group 23

  24. References • “Failure of Two-Factor Authentication.” Schneier on Security. 12 Jul. 2006. Bruce Schneier. 28 Jan. 2007 <http://www.schneier.com/blog/archives/2006/07/failure_of_twof.html>. • “Internet Penetration and Impact.” Pew/Internet. April 2006. Pew Internet & American Life Project. 28 Jan. 2007 <http://www.pewinternet.org/pdfs/PIP_Internet_Impact.pdf>. • “Internet Statistics Compendium - Sample.” E-consultancy.com. 9 Jan. 2007. E-consultancy.com LTD. 28 Jan. 2007 <http://www.e-consultancy.com/publications/download/91130/internet-stats-compendium/internet-stats-compendium-January-2007-SAMPLE.doc>. • “Internet World Stats.” Internet World Stats. 11 Jan. 2007. Internet World Stats. 15 Feb. 2007 <http://www.internetworldstats.com/stats2.htm >. • “Online Banking Increased 47% since 2002.” ClickZ Stats. 9 Feb. 2007. The ClickZ Network. 15 Feb. 2007 <http://www.clickz.com/showPage.html?page=3481976#table>. 3/1/2007 Red Group 24

  25. References (cont.) • “Phishing Activity Trends: Report for the Month of November, 2006.” Anti-Phishing Working Group. Nov. 2006. Anti-Phishing Working Group. 28 Jan. 2007 <http://www.antiphishing.org/reports/apwg_report_november_2006.pdf>. • “Real-World Passwords.” Schneier on Security. 14 Dec. 2006. Bruce Schneier. 28 Jan. 2007 <http://www.schneier.com/blog/archives/2006/12/realworld_passw.html>. • “RSA SecurID Authentication.” RSA Security. 2007. RSA Security, Inc. 28 Jan. 2007 <http://www.rsasecurity.com/node.asp?id=1156>. • “RSA Security Password Management Survey.” RSA Security. Sep. 2006. Wikipedia. 15 Feb. 2007 <http://www.rsa.com/products/SOM/whitepapers/PASSW_WP_0906.pdf >. • “Rural America Slow to Adopt Broadband.” ClickZ Stats. 27 Feb. 2007. The ClickZ Network. 28 Feb. 2007 <http://www.clickz.com/showPage.html?page=3587781#table2>. 3/1/2007 Red Group 25

More Related