We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: How many FIDO protocols are needed? Surveying the design, security and market perspectives

Authors: Anna Angelogianni, Ilias Politis, Christos Xenakis (University of Piraeus, Greece)
Abstract: Unequivocally, a single man in possession of a strong password is not enough to solve the issue of security. Studies indicate that passwords have been subjected to various attacks, regardless of the applied protection mechanisms due to the human factor. The keystone for the adoption of more efficient authentication methods by the different markets is the trade-off between security and usability. To bridge the gap between user-friendly interfaces and advanced security features, the Fast Identity Online (FIDO) alliance defined several authentication protocols. Although FIDO's biometric-based authentication is not a novel concept, still daunts end users and developers, which may be a contributor factor obstructing FIDO's complete dominance of the digital authentication market. This paper traces the evolution of FIDO protocols, by identifying the technical characteristics and security requirements of the FIDO protocols throughout the different versions while providing a comprehensive study on the different markets (e.g., digital banking, social networks, e-government, etc.), applicability, ease of use, extensibility and future security considerations. From the analysis, we conclude that there is currently no dominant version of a FIDO protocol and more importantly, earlier FIDO protocols are still applicable to emerging vertical services.
Comments: This paper is submitted for publication to ACM Computing Surveys
Subjects: Cryptography and Security (cs.CR)
DOI: 10.1145/1122445.1122456
Cite as: arXiv:2107.00577 [cs.CR]
  (or arXiv:2107.00577v1 [cs.CR] for this version)

Submission history

From: Ilias Politis Dr [view email]
[v1] Tue, 29 Jun 2021 13:56:41 GMT (12547kb,D)

Link back to: arXiv, form interface, contact.