Better authentication password revolution by evolution (transcript of discussion)

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

The problem is that passwords are a rubbish way of authenticating, and there has been a lot of work trying to deal with this. One of the problems is that if you have a shared secret scheme then you need a different secret for every pair of things. For every user they need a different secret per thing they are authenticating to. If they have several of devices then they need one set of these per device as well, so that if one of them is compromised then you don't lose everything. However revocation and key management are then difficult. The problem with passwords is that you still have to use them because lots of things require a password input, and it's hard to change that.
Original languageEnglish
Title of host publicationSecurity Protocols XXII
Subtitle of host publication22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers
EditorsBruce Christianson, James Malcolm, Vashek Matyáš, Petr Švenda, Frank Stajano, Jonathan Anderson
Place of PublicationCham, Switzerland
PublisherSpringer
Pages146-153
Number of pages8
ISBN (Print) 9783319123998
DOIs
Publication statusPublished - 29 Oct 2014

Keywords

  • passwords
  • authentication
  • key management

Fingerprint Dive into the research topics of 'Better authentication password revolution by evolution (transcript of discussion)'. Together they form a unique fingerprint.

  • Cite this

    Thomas, D. R. (2014). Better authentication password revolution by evolution (transcript of discussion). In B. Christianson, J. Malcolm, V. Matyáš, P. Švenda, F. Stajano, & J. Anderson (Eds.), Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers (pp. 146-153). Springer. https://doi.org/10.1007/978-3-319-12400-1_14