Convenient Decentralized Authentication Using Passwords

Passwords are a very convenient way to authenticate. In terms of simplicity and portability they are very difficult to match. Nevertheless, current password-based login mechanisms are vulnerable to phishing attacks and typically require users to create and manage a new password for each of their acc...

Full description

Bibliographic Details
Main Author: Van Der Horst, Timothy W.
Format: Others
Published: BYU ScholarsArchive 2010
Subjects:
Online Access:https://scholarsarchive.byu.edu/etd/2105
https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3104&context=etd
id ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-3104
record_format oai_dc
spelling ndltd-BGMYU2-oai-scholarsarchive.byu.edu-etd-31042019-05-16T03:32:04Z Convenient Decentralized Authentication Using Passwords Van Der Horst, Timothy W. Passwords are a very convenient way to authenticate. In terms of simplicity and portability they are very difficult to match. Nevertheless, current password-based login mechanisms are vulnerable to phishing attacks and typically require users to create and manage a new password for each of their accounts. This research investigates the potential for indirect/decentralized approaches to improve password-based authentication. Adoption of a decentralized authentication mechanism requires the agreement between users and service providers on a trusted third party that vouches for users' identities. Email providers are the de facto trusted third parties on the Internet. Proof of email address ownership is typically required to both create an account and to reset a password when it is forgotten. Despite its shortcomings (e.g., latency, vulnerability to passive attack), this approach is a practical solution to the difficult problem of authenticating strangers on the Internet. This research utilizes this emergent, lightweight relationship with email providers to offload primary user authentication from service providers; thus reducing the need for service provider-specific passwords. Our goal is to provide decentralized authentication that maintains the convenience and portability of passwords, while improving its assurances (especially against phishing). Our first step to leverage this emergent trust, Simple Authentication for the Web (SAW), improves the security and convenience of email-based authentications and moves them from the background into the forefront, replacing need for an account-specific password. Wireless Authenticationg using Remote Passwords (WARP) adapts the principles of SAW to authentication in wireless networks. Lightweight User AUthentication (Luau) improves upon WARP and unifies user authentication across the application and network (especially wireless) layers. Our final protocol, pwdArmor, started as a simple wrapper to facilitate the use of existing databases of password verifiers in Luau, but grew into a generic middleware framework that augments the assurances of conventional password protocols. 2010-03-10T08:00:00Z text application/pdf https://scholarsarchive.byu.edu/etd/2105 https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3104&context=etd http://lib.byu.edu/about/copyright/ All Theses and Dissertations BYU ScholarsArchive authentication email-based authentication passwords password-authenticated key exchange single sign-on authentication in wireless networks Computer Sciences
collection NDLTD
format Others
sources NDLTD
topic authentication
email-based authentication
passwords
password-authenticated key exchange
single sign-on
authentication in wireless networks
Computer Sciences
spellingShingle authentication
email-based authentication
passwords
password-authenticated key exchange
single sign-on
authentication in wireless networks
Computer Sciences
Van Der Horst, Timothy W.
Convenient Decentralized Authentication Using Passwords
description Passwords are a very convenient way to authenticate. In terms of simplicity and portability they are very difficult to match. Nevertheless, current password-based login mechanisms are vulnerable to phishing attacks and typically require users to create and manage a new password for each of their accounts. This research investigates the potential for indirect/decentralized approaches to improve password-based authentication. Adoption of a decentralized authentication mechanism requires the agreement between users and service providers on a trusted third party that vouches for users' identities. Email providers are the de facto trusted third parties on the Internet. Proof of email address ownership is typically required to both create an account and to reset a password when it is forgotten. Despite its shortcomings (e.g., latency, vulnerability to passive attack), this approach is a practical solution to the difficult problem of authenticating strangers on the Internet. This research utilizes this emergent, lightweight relationship with email providers to offload primary user authentication from service providers; thus reducing the need for service provider-specific passwords. Our goal is to provide decentralized authentication that maintains the convenience and portability of passwords, while improving its assurances (especially against phishing). Our first step to leverage this emergent trust, Simple Authentication for the Web (SAW), improves the security and convenience of email-based authentications and moves them from the background into the forefront, replacing need for an account-specific password. Wireless Authenticationg using Remote Passwords (WARP) adapts the principles of SAW to authentication in wireless networks. Lightweight User AUthentication (Luau) improves upon WARP and unifies user authentication across the application and network (especially wireless) layers. Our final protocol, pwdArmor, started as a simple wrapper to facilitate the use of existing databases of password verifiers in Luau, but grew into a generic middleware framework that augments the assurances of conventional password protocols.
author Van Der Horst, Timothy W.
author_facet Van Der Horst, Timothy W.
author_sort Van Der Horst, Timothy W.
title Convenient Decentralized Authentication Using Passwords
title_short Convenient Decentralized Authentication Using Passwords
title_full Convenient Decentralized Authentication Using Passwords
title_fullStr Convenient Decentralized Authentication Using Passwords
title_full_unstemmed Convenient Decentralized Authentication Using Passwords
title_sort convenient decentralized authentication using passwords
publisher BYU ScholarsArchive
publishDate 2010
url https://scholarsarchive.byu.edu/etd/2105
https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=3104&context=etd
work_keys_str_mv AT vanderhorsttimothyw convenientdecentralizedauthenticationusingpasswords
_version_ 1719186710518038528