Better Authentication Password Revolution by Evolution (Transcript of Discussion)
- Cite this paper as:
- Thomas D.R. (2014) Better Authentication Password Revolution by Evolution (Transcript of Discussion). In: Christianson B., Malcolm J., Matyáš V., Švenda P., Stajano F., Anderson J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science, vol 8809. Springer, Cham
The problem is that passwords are a rubbish way of authenticating, and there has been a lot of work trying to deal with this. One of the problems is that if you have a shared secret scheme then you need a different secret for every pair of things. For every user they need a different secret per thing they are authenticating to. If they have several of devices then they need one set of these per device as well, so that if one of them is compromised then you don’t lose everything. However revocation and key management are then difficult. The problem with passwords is that you still have to use them because lots of things require a password input, and it’s hard to change that.