TUSH-Key: Transferable User Secrets on Hardware Key

07/14/2023
by   Aditya Mitra, et al.
0

Passwordless authentication was first tested for seamless and secure merchant payments without the use of passwords or pins. It opened a whole new world of authentications giving up the former reliance on traditional passwords. It relied on the W3C Web Authentication (WebAuthn) and Client to Authenticator Protocol (CTAP) standards to use the public key cryptosystem to uniquely attest a user's device and then their identity. These standards comprise of the FIDO authentication standard. As the popularity of passwordless is increasing, more and more users and service providers are adopting to it. However, the concept of device attestation makes it device-specific for a user. It makes it difficult for a user to switch devices. FIDO Passkeys were aimed at solving the same, synchronizing the private cryptographic keys across multiple devices so that the user can perform passwordless authentication even from devices not explicitly enrolled with the service provider. However, passkeys have certain drawbacks including that it uses proprietary end to end encryption algorithms, all keys pass through proprietary cloud provider, and it is usually not very seamless when dealing with cross-platform key synchronization. To deal with the problems and drawbacks of FIDO Passkeys, the paper proposes a novel private key management system for passwordless authentication called Transferable User Secret on Hardware Key (TUSH-Key). TUSH-Key allows cross-platform synchronization of devices for seamless passwordless logins with FIDO2 specifications.

READ FULL TEXT

page 4

page 11

page 12

research
04/12/2022

Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

Public key authentication (PKA) has been deployed in various services to...
research
08/09/2021

Technical Report on a Virtual CTAP2 WebAuthn Authenticator

Even though passwordless authentication to online accounts offers greate...
research
11/13/2019

TPM-FAIL: TPM meets Timing and Lattice Attacks

Trusted Platform Module (TPM) serves as a hardware-based root of trust t...
research
01/04/2023

MetaSecure: A Passwordless Authentication for the Metaverse

Metaverse in general holds a potential future for cyberspace. At the beg...
research
03/07/2019

JSON Web Token (JWT) based client authentication in Message Queuing Telemetry Transport (MQTT)

This paper is an overview of JSON Web Token (JWT) and Transport Layer Se...
research
08/12/2022

Mutual authentication in self-organized VANETs

The practical deployment of vehicular networks is still a pending issue....
research
05/21/2020

Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets

We revisit the problem of entity authentication in decentralized end-to-...

Please sign up or login with your details

Forgot password? Click here to reset