Page 15 - Implementation of Secure Authentication Technologies for Digital Financial Services
P. 15

6  STRONG AUTHENTICATION TECHNOLOGIES AND SPECIFICATIONS

            Authentication systems  involve individuals,  creden-  systems are not easy for mobile users to interact
            tials issued to those individuals, and authenticators   with: on mobile devices, authentication events are
            used by the individual to prove they are the original   infrequent and rely on device security locks that may
            registered credential receiver. Authentication proto-  not be effective.
            cols  define  how  each  element  interacts  to  authen-  Advanced authentication systems are designed to
            ticate the individual. Each element has observable   address today’s threat models and design patterns.
            or measurable behaviors in the environment which   Compared to ‘strong’ authentication systems, there
            can be compared to previously-measured ‘normal’    is an increased emphasis on detection and authen-
            behavior.                                          tication of human users versus the client software
               Design decisions and technology choices for each   used by people through environmental and behav-
            authentication system element affect how ‘strong’   ioral analysis. New approaches are being implement-
            an authentication system is: how resistant to attack   ed to minimize friction for mobile and multi-factor
            and compromise due to common threats. ‘Strong’     use cases: many systems are now built with ‘mobile
            authentication systems are designed to mitigate    first’ designs. Authentication now happens at many
            threats that ‘weak’ authentication systems do not.  points during a user-system interaction: at identifi-
               For example, a weakness for individuals is having   cation time, at times when increased privileges are
            to deal with password systems. Passwords are hard to   invoked (so-called ‘step-up’ authentication), and
            remember, easy to steal, reused across services and   even continuously during the entire session.
            very inconvenient to use. Stronger authentication    Advanced authentication systems do not replace
            systems might choose to use a biometric to unlock   strong authentication systems – the technologies
            a local secure encryption key vault, which gives the   work together to address different threats and vul-
            individual a lower-friction, password-less experience.  nerabilities.
               Authenticators such as SMS-delivered one-time     The objective of advanced authentication systems
            codes that are subject to phishing could be replaced   is to provide a low-friction experience for users, while
            by hardware cryptographic authenticators such as a   reducing risk and increasing security assurance.
            Secure Element or Trusted Execution Environment in   See 7.1 Cognitive Continuous Authentication for
            mobile devices.                                    a  description  of  a  solution  that  embodies  these
               Authentication protocols that use shared secrets   advanced authentication system characteristics.
            or unencrypted transmissions could be replaced with
            asymmetric key cryptographic protocols, encrypt-   6�2  FIDO Alliance Specifications
            ed channels and different keys for each service.   The FIDO Alliance protocols use standard public
            Multi-factor authentication protocols have additional   key cryptography techniques to provide stronger
            attacker resistance than single-factor protocols.  authentication. During registration with an online
               The threat landscape changes regularly and      service, the user’s client device creates a new key
            design decisions must be made to address new or    pair. It retains the private key and registers the public
            commonly-used threats. For example, threats to web   key with the online service. Authentication is done
            site access from desktop computers are different   by the client device proving possession of the private
            from mobile-only apps and services which have been   key to the service by signing a challenge. The client’s
            invented in recent years.                          private keys can be used only after they are unlocked
                                                               locally on the device by the user called “user veri-
            6�1  Characteristics of Advanced Authentication    fication”. User verification can take the form of any
            Systems                                            number of user–friendly and secure action such as
            Typical authentication systems in use today were   swiping a finger, performing facial recognition, enter-
            designed for the pre-mobile-device internet. They   ing a PIN, or speaking into a microphone. Private keys
            are based on a single authentication event, typically   are bound to a device and prove that users are in
            performed at application start up, and assume that   possession of a specific device (i.e. – the “something
            the user, device and session do not change after that   you have” of authentication), and their combination
            single authentication event. Authentication tends to   with user verification ensures that every authentica-
            be a high friction activity with a poor user experience,   tion is multi-factor authentication.
            especially when password or multi-factor authenti-   FIDO protocols are designed to protect user pri-
            cation  are  used.  Current-generation  authentication   vacy. The protocols do not provide information that



                                             Implementation of Secure Authentication Technologies for Digital Financial Services  13
   10   11   12   13   14   15   16   17   18   19   20