Quantitative Examination of Multiple Authenticator Deployment

Quantitative Examination of Multiple Authenticator Deployment

It appears that there are so many security professionals who pay no attention to the exactly opposite effects of 'multi-layer' and 'multi-entrance deployments. ‘Multi-Layer’ is also represented by ‘In-Series’, ‘In-Addition-To’, ‘All/BothAnd’ and ‘Conjunction’ in logic, while ‘Multi-Entrance’ by ‘In-Parallel’, ‘In-Stead-Of’, ‘EitherOr’ and ‘Disjunction’. Let me offer a quantitative examination of multiple authenticators deployed in two different ways.

 Vulnerability (attack surface) of an authenticator is generally presented as a figure between 0 and 1. The larger the figure is, the larger the attack surface is, i.e., the more vulnerable. Assume, for instance, as just a thought experiment, that the vulnerability of the PKI-enabled token (x) be 1/10,000 and that of the password (y) be 10 times more vulnerable, say. 1/1,000. When the two are deployed in ‘multi-layer’ method, the total vulnerability (attack surface) is the product of the two, say, (x) and (y) multiplied. The figure of 1/10,000,000 means it is 1,000 times more secure than (x) alone.

 On the other hand, when the two are authenticators deployed in ‘multi-entrance’ method, the total vulnerability (attack surface) is obtained by (x) + (y) – (xy), approximately 0.0011. It is about 11 times less secure than (x) alone.

 So long as the figures are below 1, whatever figures are given to (x) and (y), deployment of 2 authenticators in ‘multi-layer’ method brings higher security while ‘multi-entrance’ deployment brings lower security. As such ‘multi-layer’ and ‘multi-entrance’ must be distinctly separated when talking about security effects of multiple authenticators.

 Remark: Some people may wonder why (xy) is deducted from the sum of (x)+(y).

 When (x) and (y) is very small, the (xy) is very close to 0, which we can practically ignore. But we should not ignore it when the figures are considerably large.

 Suppose a case that both the two authenticators are deployed in an extremely careless manner, for instance, that the attack surfaces of (x) and (y) reach 70% (0.7) and 60% (0.6) respectively. If simply added the figure would be 130% (1.3). It conflicts with the starting proposition the figures being between 0 and 1.

 Imagine a white surface area. Painting 70% of it in black leaves 30% white surface. Painting 60% of the remaining 30% in black will result in 88% black and 12% white surfaces. Painting 60% first in black and then painting 70% of the remaining 40% brings the same result of 88% black and 12% white. So does “(x)+(y)--(xy)”. The overall vulnerability (attack surface) is 0.88 (88%) in this case.

The same calculation applies to biometrics used in cyber space where it has to rely on a fallback password/PIN deployed in ‘multi-entrance’ method against false rejection. You might assume that biometrics deployed with a password/PIN in ‘multi-layer’ method should bring us a very high security. But, very sadly, this scenario never comes true. When rejected by biometrics, what can we do? We will only see that we are unable to login even if we can feed our password/PIN.

No alt text provided for this image


Key References

Negative Security Effect of Biometrics Deployed in Cyberspace

Removal of Passwords and Its Security Effect

External Body Features Viewed as ‘What We Are’

No alt text provided for this image
No alt text provided for this image


Additional References

“Impact of Episodic Memory on DigitalIdentity”

Digital Identity for Global Citizens

What We Know for Certain about Authentication Factors

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues (30/June/2020)

No alt text provided for this image


< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

No alt text provided for this image

?

?? René J.L. Tieben

Cyber-defense & information security @FEV

4 年

Its not the core of the discussion, but also keep in mind that bio-metrics can not be replaced easily or not at all. Once lost in a breach / theft etc. the implications are unforeseeable.

回复
Chirculescu Horia

OLE for Process Control (OPC), Oracle DBA, HP-UX, Linux

5 年

"You might assume that biometrics deployed with a password/PIN in ‘multi-layer’ method should bring us a very high security. But, very sadly, this scenario never comes true. When rejected by biometrics, what can we do? We will only see that we are unable to login even if we can feed our password/PIN." I believe it is a step forward to introduce also a second layer when it comes to biometrics, because it would help in the event when biometrics would pass, a PIN would actualy add strength to the security of the system. Let's discuss the example of a car: if the car would accept biometrics data and give authorization, having a PIN authentication to start the engine is another way to protect the car from being stolen.

回复

要查看或添加评论,请登录

Hitoshi Kokumai的更多文章

社区洞察

其他会员也浏览了