Skip to main content

2014 | OriginalPaper | Buchkapitel

Bootstrapping Adoption of the Pico Password Replacement System

verfasst von : Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington

Erschienen in: Security Protocols XXII

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In previous work we presented Pico, an authentication system designed to be both more usable and more secure than passwords. One unsolved problem was that Pico, in its quest to explore the whole solution space without being bound by compatibility shackles, requires changes at both the prover and the verifier, which makes it hard to convince anyone to adopt it: users won’t buy an authentication gadget that doesn’t let them log into anything and service providers won’t support a system that no users are equipped to log in with. In this paper we present three measures to break this vicious circle, starting with the “Pico Lens” browser add-on that rewrites websites on the fly so that they appear Pico-enabled. Our add-on offers the user most (though not all) of the usability and security benefits of Pico, thus fostering adoption from users even before service providers are on board. This will enable Pico to build up a user base. We also developed a server-side Wordpress plugin which can serve both as a reference example and as a useful enabler in its own right (as Wordpress is one of the leading content management platforms on the web). Finally, we developed a software version of the Pico client running on a smartphone, the Pico App, so that people can try out Pico (at the price of slightly reduced security) without having to acquire and carry another gadget. Having broken the vicious circle we’ll be in a stronger position to persuade providers to offer support for Pico in parallel with passwords.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The project’s website, http://​pico.​cl.​cam.​ac.​uk/​, contains a brief introductory video, the original paper, a FAQ and other resources.
 
2
According to W3techs statistics (http://​w3techs.​com/​technologies/​overview/​content_​management/​all/​), as of February 2014, Wordpress is the most widely used Content Management System on the web, being used by 21.5 % of all websites and by 60.0 % of all websites that use a content management system.
 
3
Delegation is a process whereby a principal authorises an agent to act on its behalf by transferring a set of rights.
 
4
The session delegation protocol used by Pico is described in further detail in our other paper “I bought a new security token and all I got was this lousy phish—Relay attacks on visual code authentication schemes”, also in these proceedings.
 
5
To perform Pico authentication with a Pico-enabled website, the Pico Lens, which rewrites legacy login pages to add a QR code to them, is clearly not required; however, some Pico browser add-on is still needed for receiving session delegation tokens from the Pico device.
 
6
The Pico Lens at this stage has no idea that this is going to be a first-time pairing rather than a regular login, so it behaves exactly as in the previous case.
 
7
We call “password manager” a piece of software that records username-password pairs on behalf of the user and supplies them to verifiers as appropriate, saving the user from having to remember and retype them. A password manager may be a standalone program or it may be integrated in a web browser. Password managers may store their database locally or in the cloud, and in cleartext or in encrypted form. The latter case provides greater security but requires entering a master password.
 
8
The pairing code is currently unencrypted. If the visual code is observed during the account pairing, the attacker gains the user’s password for that website.
 
9
Bearing in mind scenarios in which one Lens serves several Pico devices, as when several family members use the shared tablet in the living room.
 
10
It would be nice if websites published their password policy in a uniform machine-readable form; and even nicer if they imposed no upper bounds on making passwords arbitrarily long and complicated. As argued by Bonneau and Preibusch [4], websites that impose such limits probably do so because they are not hashing their passwords.
 
11
A risk that is greatly reduced with Pico, which is a dedicated device not intended to run other software.
 
12
As of January 2014, Chrome holds 55.7 % market share, with Firefox a distant second at 26.9 %, according to W3schools statistics (http://​www.​w3schools.​com/​browsers/​browsers_​stats.​asp).
 
13
See footnote 2
 
Literatur
3.
Zurück zum Zitat Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP ’12, pp. 553–567. IEEE Computer Society, Washington (2012). http://dx.doi.org/10.1109/SP.2012.44 Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP ’12, pp. 553–567. IEEE Computer Society, Washington (2012). http://​dx.​doi.​org/​10.​1109/​SP.​2012.​44
4.
Zurück zum Zitat Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: WEIS 2010 (2010) Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: WEIS 2010 (2010)
5.
Zurück zum Zitat Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)CrossRef Brands, S., Chaum, D.: Distance bounding protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)CrossRef
6.
7.
Zurück zum Zitat ISO: Information technology–automatic identification and data capture techniques–QR Code 2005 bar code symbology specification. ISO 18004:2006, International Organization for Standardization, Geneva, Switzerland (2006) ISO: Information technology–automatic identification and data capture techniques–QR Code 2005 bar code symbology specification. ISO 18004:2006, International Organization for Standardization, Geneva, Switzerland (2006)
8.
Zurück zum Zitat Krawczyk, H.: SIGMA: the ‘SIGn-and-MAc’ approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003)CrossRef Krawczyk, H.: SIGMA: the ‘SIGn-and-MAc’ approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003)CrossRef
11.
Zurück zum Zitat Stajano, F.: Pico: no more passwords!. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49–81. Springer, Heidelberg (2011) Stajano, F.: Pico: no more passwords!. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49–81. Springer, Heidelberg (2011)
Metadaten
Titel
Bootstrapping Adoption of the Pico Password Replacement System
verfasst von
Frank Stajano
Graeme Jenkinson
Jeunese Payne
Max Spencer
Quentin Stafford-Fraser
Chris Warrington
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-12400-1_17