Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Two-factor authentication at GDG Tartu

Two-factor authentication at GDG Tartu

Harri talks about why two-factor authentication matters and how it is most commonly used on mobile phones.

Harri Kirik

August 03, 2017
Tweet

More Decks by Harri Kirik

Other Decks in Technology

Transcript

  1. designing & developing for mobile Factors of authentication ➔ Knowledge

    factors ➔ Posession factors ➔ Inheritance factors
  2. designing & developing for mobile Knowledge factors ➔ Pin ➔

    Password ➔ Passphrase ➔ Shape ➔ Hidden compartment ➔ “Secret” question
  3. designing & developing for mobile Posession factors ➔ Key ➔

    Code card ➔ Pin generator / calculator ➔ Id card ➔ USB stick based token ➔ Your phone
  4. designing & developing for mobile Inheritance factors ➔ Fingerprints ➔

    Retinal scans ➔ Voice ➔ Text typing patterns ➔ Your guard dog
  5. designing & developing for mobile Multi-factor authentication, using ➔ Knowledge

    factors ➔ Posession factors ➔ Inheritance factors
  6. designing & developing for mobile 2FA - You’ve done it!

    ➔ Taking money out of the ATM ➔ Accessing banks via web page ➔ Adding a “secret lock” to your car ➔ Getting past your dog
  7. designing & developing for mobile Use a code, which is

    ➔ Valid only for one time use ➔ Specific for every use ➔ Human readable ➔ Simple to enter ➔ Nonreversible
  8. designing & developing for mobile 1. Generate the Key (once)

    2. Calculate Hash = HMAC-SHA-1(Key, Counter); 2. Make it “human-usable” HOTP value = Truncate(Hash)
  9. designing & developing for mobile 1. Generate and share the

    Key (once) 2. Calculate Counter = (Current time - Epoch) / Step 2. Use HOTP TOTP value = HOTP(Key, Counter)