Hitoshi Kokumai

4年前 · 2 分の読書時間 · ~10 ·

ブログ作成
>
ブログ Hitoshi
>
Identity Assurance - Sufficient and Necessary Conditions

Identity Assurance - Sufficient and Necessary Conditions

92be20f7.jpg

It is not easy to define the 'sufficient condition' for describing a set of processes used to establish that a natural person is real, unique, and identifiable; criminals keep coming up with hitherto unknown weapons to compromise the said processes.

But we are easily able to define the 'necessary condition'; it is that the 'secret credential', i.e., the likes of passwords, is absolutely indispensable for the processes to stay reliable.

Let us summarize the characteristics of the factors for the processes, namely, the authenticators, as follows.

1. Secret credentials are absolutely indispensable, without which identity assurance would be a disaster. (Ref. Removal of Passwords and Its Security Effect )

2. Two-factor authentication made of passwords and tokens provides a higher security than a single-factor authentication of passwords or

tokens. (Ref. Quantitative Examination of Multiple Authenticator Deployment )

3. Pseudo two-factor authentication made of biometrics and a password brings down the security to the level lower than a password-alone

authentication. (Ref. Negative Security Effect of Biometrics Deployed in Cyberspace )

4. Passwords are the last resort in such emergencies where we are naked and injured (Ref. Availability-First Approach

5. We could consider expanding the password systems to accept both images and texts to drastically expand the scope of secret credentials. (Ref. Proposition on How to Build Sustainable Digital Identity Platform )

As for Item 5, we could add the following.

Easy-to-Remember’ is one thing. Hard-to-Forget’ is another - The observation that images are easy to remember has been known for many decades; it is not what we discuss. What we discuss is that ‘images of our emotion-colored episodic memory’ is ‘Hard to Forget’ to the extent that it is ‘Panic-Proof’. This feature makes the applied solutions deployable in any demanding environments for any demanding use cases, with teleworking in stressful situations like pandemic included.

The password is easy to crack – Are you sure?

Quite a few security professionals say ‘Yes’ very loudly.

We would say that a ‘hard-to-crack’ password is hard to crack and an ‘easy-to-crack’ password is easy to crack, just as strong lions are strong and weak lions are weak; look at babies, the inured and aged.

However hard or easy to manage, the password is absolutely indispensable, without which digital identity would be just a disaster. We need to contemplate on how to make the password harder to crack while making it harder to forget.

This subject and related issues are also discussed on Payments Journal, InfoSec Buzz and Risk Group

https://www.paymentsjournal.com/easy-to-remember-is-one-thing-hard-to-forget-is-another/

https://www.informationsecuritybuzz.com/articles/identity-assurance-and-teleworking-in-pandemic/

https://riskgroupllc.com/democracy-and-digital-identity-2/

Future society enabled by the expanded password system

Textual passwords could suffice two decades ago when computing powers were still limited, but the exponentially accelerating computing powers have now made the textual passwords too vulnerable for many of the cyber activities. The same computing powers are, however, now enabling us to handle images and making more and more of our digital dreams come true, some of which are listed below.

- Electronic Money & Crypto-Currency

- Hands-Free Payment & Empty-Handed Shopping

- ICT-assisted Disaster Prevention, Rescue & Recovery

- Electronic Healthcare & Tele-Medicine to support terminal care in homes

- Pandemic-resistant Teleworking

- Hands-Free Operation of Wearable Computing

- User-Friendlier Humanoid Robots

- Safer Internet of Things

- More effective Defense & Law Enforcement

all of which would be the pie in the sky where there is no reliable identity assurance.

< Related Articles >

History, Current Status and Future Scenarios of Expanded Password System

Negative Security Effect of Biometrics Deployed in Cyberspace

#identity #authentication #password #security #biometrics #ethic #privacy #democracy #emergency #disaster #panic #defense #government #pandemic #teleworking


コメント

Hitoshi Kokumaiの記事

ブログを見る
2年前 · 2 分の読書時間

Today's topic is this report - “How blockchain technology can create secure digital identities” · h ...

2年前 · 3 分の読書時間

I take up this new report today - “Researchers Defeated Advanced Facial Recognition Tech Using Makeu ...

2年前 · 2 分の読書時間

Some friends directed my attention to this news report - · “Biometric auth bypassed using fingerpri ...

この職種に興味がある方はこちら


  • イーサスタック・ジャパン(株) 神奈川県, 日本

    次の業務をお任せいたします。■業務無線機器の組み込みソフトウェア開発■業務無線ネットワークのソフトウェア開発■暗号化装置のソフトウェア開発■新たに開発された無線機器等へのポーティング(移植) · 【顧客】国(警察等の防衛)、通信会社、電力会社等 · 【強み】当社の持つデジタル無線ネットワークおよび戦術通信製品は、国の防衛組織や公共機関で利用されることが多く売上等安定しております。直近では「LMR、衛星、携帯電話のプッシュツートーク通信技術」によりサムスンやノキアとの契約や、オーストラリアでの防衛契約拡張もあり、右肩上がりの成長を続けております。 ...


  • みやび個別指導学院 池田校 揖斐郡池田町, 日本 パートタイム

    雇用形態 · アルバイト · 職種・指導形態 · 個別指導 · 生徒の希望に合わせて、1対1・1対2・1対3のいずれかの形式で指導を行っていただきます。 · 給与 · 1コマ50分1,000円 · ※小学生の場合 · ※上記には最大10分までの授業準備時間を含む · ※指導人数により上記に人数手当(最大+100円)を加算 · ※授業時間については、50分・80分・100分があります · 最寄駅 · 池野駅より徒歩6分 · 池野駅から南西に300m、トミダヤ池田店向かい · 待遇 · 英会話スクールNOVAのレッスンを社内割引価格(20%割引)で受講可能で ...


  • 公開範囲1.等を含む求人情報を公開する Tohoku, 日本 フルタイム

    仕事内容 · ・薬局内の掃除・備品の整理整頓 · ・他社や支店へのお遣い(AT車運転) · ・受付業務 · 処方せんを受取、処方せんの内容をPC入力。 · 患者さんの対応をしながら、会計の対応も行っていただきます。 · ・調剤補助業務 · 処方せんの内容を確認し、薬を取り揃える。 · 商品の発注補助や商品の納品・検品。 · ・レセプト業務 · 当社では「私たち患者様に渡したいのは、思いやりと健康という薬 · です。」という経営理念の下、患者様、職員、薬剤師とのコミュニ · ケーションを大切にし、地域に愛される薬局を目指しております。 · 雇用形態 正 ...