SlideShare a Scribd company logo
#FIDOseminar
BECOMING UNPHISHABLE
TOWARDS SIMPLER, STRONGER
AUTHENTICATION
Alexei Czeskis
Google
Introduction and Agenda
Part of the team responsible for authentication at Google
Agenda
• Passwords are broken
• Introducing Security Key
• Google’s Experience
• Some numbers
• We’re not quite done
• How can you get started?
Passwords are broken
Passwords are broken
Phishing has become increasingly sophisticated
● More than ⅔ of incidents [in 2015] … involved phishing. With
a 23% effectiveness rate*
● OTPs help against shared password, but it’s not safe to rely
on them for phishing
* http://www.verizonenterprise.com/DBIR/2015/
REUSED PHISHED KEYLOGGED
Is Phishing Effective?
Today’s solution: One Time Passwords
SMS
USABILITY
Coverage Issues - Delay - User Cost
DEVICE USABILITYOne Per Site - Expensive - Fragile
USER EXPERIENCEUsers find it hard
PHISHABLE
German Police re: iTan:
".. we still lose money"
Introducing Security Key
Introducing Security Key
Designed to solve authentication
challenges
• For enterprises
• For consumers
Based on FIDO U2F standard
• Safe: Unphishable / UnMITMable
• Easy: Insert and press button
• Compact: One device, many
services
Simple operation
1 2 3
Userid & Password Insert, Press button Successful Sign in
Based on Asymmetric Cryptography
Core idea - Standard public key cryptography
• User's device mints new key pair, gives public key to server
• Server asks user's device to sign data to verify the user.
• One device, many services, "bring your own device" enabled
Google’s experience
Deployment at Google
• Enterprise use case
• Mandated for Google employees
• Corporate SSO (Web)
• SSH
• Forms basis of all authentication
• Consumer use case
• Available as opt-in for Google consumers
• Adopted by other relying parties too: Dropbox,
Github
Time to authenticate
Time to authenticate
Security Keys are faster to use than OTPs
"If you've been reading your e-mail" takeaway:
Second Factor Support Incidents
Second Factor Support Incidents
Security Keys cause fewer support
incidents than OTPs
"If you've been reading your e-mail" takeaway:
We're not quite done...
Ongoing work
• Wireless protocols
• NFC, BLE
• More browsers
• Firefox, Edge, more?
• More platforms
• Android, Windows, OS X/iOS?
• V2 of the protocol
• Device-centric authentication
How can you get started?
U2F use cases
• Internal enterprise authentication (B2B)
Authenticate to your own web applications, mobile
applications, etc
• Authenticate to your service providers
(“token necklace”)
U2F works well in a non-federated environment
Complete isolation between various RPs
• External customer authentication
Authenticate your high-value customers using U2F
Resources
• To use with Google
Enable 2-Step Verification on your account
Go to: https://security.google.com
Click: 2-Step Verification
Click on the Security Keys tab
• Also use with GitHub, Dropbox
• And / or play with some code
https://github.com/google/u2f-ref-code
https://developers.yubico.com/U2F/Libraries/List_of_libraries.h
tml
Q & A

More Related Content

PDF
FIDO, Federation & Facebook Social Login
FIDO Alliance
 
PDF
Protecting IDAAS with FIDO Authentication
FIDO Alliance
 
PDF
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
FIDO Alliance
 
PDF
NTT DOCOMO Deployment Case Study
FIDO Alliance
 
PDF
NTT DOCOMO Deployment Case Study: Your Security, More Simple
FIDO Alliance
 
PDF
FIDO Certified Program: Status & Futures
FIDO Alliance
 
PDF
Consumer Authentication Trends in APAC
FIDO Alliance
 
PDF
Introduction to FIDO Authentication
FIDO Alliance
 
FIDO, Federation & Facebook Social Login
FIDO Alliance
 
Protecting IDAAS with FIDO Authentication
FIDO Alliance
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
FIDO Alliance
 
NTT DOCOMO Deployment Case Study
FIDO Alliance
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple
FIDO Alliance
 
FIDO Certified Program: Status & Futures
FIDO Alliance
 
Consumer Authentication Trends in APAC
FIDO Alliance
 
Introduction to FIDO Authentication
FIDO Alliance
 

What's hot (20)

PDF
Business Considerations for Deploying FIDO Authentication
FIDO Alliance
 
PDF
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
FIDO Alliance
 
PDF
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
FIDO Alliance
 
PDF
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
FIDO Alliance
 
PDF
Becoming Unphishable
FIDO Alliance
 
PDF
FIDO UAF Specifications: Overview & Tutorial
FIDO Alliance
 
PDF
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO Alliance
 
PDF
FIDO And the Future of User Authentication
FIDO Alliance
 
PDF
FIDO Authentication & Blockchain
FIDO Alliance
 
PDF
Technical Principles of FIDO Authentication
FIDO Alliance
 
PPTX
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
FIDO Alliance
 
PDF
The Value of FIDO Alliance Membership
FIDO Alliance
 
PPTX
Going Passwordless with Microsoft
FIDO Alliance
 
PDF
Javelin Research 2017 State of Authentication Report
FIDO Alliance
 
PDF
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Alliance
 
PPTX
FIDO Authentication: Unphishable MFA for All
FIDO Alliance
 
PPTX
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 
PDF
Authentication and ID Proofing in Education
FIDO Alliance
 
PDF
Market Study on Mobile Authentication
FIDO Alliance
 
PDF
FIDO2 and Microsoft
FIDO Alliance
 
Business Considerations for Deploying FIDO Authentication
FIDO Alliance
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
FIDO Alliance
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
FIDO Alliance
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
FIDO Alliance
 
Becoming Unphishable
FIDO Alliance
 
FIDO UAF Specifications: Overview & Tutorial
FIDO Alliance
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO Alliance
 
FIDO And the Future of User Authentication
FIDO Alliance
 
FIDO Authentication & Blockchain
FIDO Alliance
 
Technical Principles of FIDO Authentication
FIDO Alliance
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
FIDO Alliance
 
The Value of FIDO Alliance Membership
FIDO Alliance
 
Going Passwordless with Microsoft
FIDO Alliance
 
Javelin Research 2017 State of Authentication Report
FIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 
Authentication and ID Proofing in Education
FIDO Alliance
 
Market Study on Mobile Authentication
FIDO Alliance
 
FIDO2 and Microsoft
FIDO Alliance
 
Ad

Viewers also liked (10)

PPTX
FIDO and Strong Authentication in US Federal Government
FIDO Alliance
 
PPTX
Fido China Working Group (FCWG)
FIDO Alliance
 
PPTX
FIDO Specifications Overview
FIDO Alliance
 
PPTX
Introduction to FIDO Alliance
FIDO Alliance
 
PDF
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
FIDO Alliance
 
PDF
W3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
FIDO Alliance
 
PPTX
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
FIDO Alliance
 
PDF
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Alliance
 
PDF
FIDO Alliance Activity in Japan
FIDO Alliance
 
PPTX
NTT Docomo Deployment Case Study: Your Security, More Simple
FIDO Alliance
 
FIDO and Strong Authentication in US Federal Government
FIDO Alliance
 
Fido China Working Group (FCWG)
FIDO Alliance
 
FIDO Specifications Overview
FIDO Alliance
 
Introduction to FIDO Alliance
FIDO Alliance
 
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
FIDO Alliance
 
W3C Presentation -FIDO Alliance -Tokyo Seminar -Smith
FIDO Alliance
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
FIDO Alliance
 
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO Alliance
 
FIDO Alliance Activity in Japan
FIDO Alliance
 
NTT Docomo Deployment Case Study: Your Security, More Simple
FIDO Alliance
 
Ad

Similar to Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton (20)

PPTX
Google Case Study: Becoming Unphishable
FIDO Alliance
 
PPTX
Security Keys Presentation.pptx
Alok Sharma
 
PDF
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
PDF
Google FIDO Authentication Case Study
FIDO Alliance
 
PDF
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
PDF
Google & FIDO Authentication
FIDO Alliance
 
PDF
Solving problems with authentication
MecklerMedia
 
PPTX
Understanding passwordless technologies
David Strom
 
PDF
Mobile Authentication - Moving Towards a Passwordless Future
ForgeRock Identity Tech Talks
 
PDF
OSDC 2012 | CA failures and the future of Web authentication by Dr. Christoph...
NETWAYS
 
PPTX
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
PPTX
Online privacy & security
Priyab Satoshi
 
ODP
SSL certificates
Kevin OBrien
 
PDF
Digital Signatures in the Cloud: A B2C Case Study
iText Group nv
 
PPTX
Seven Simple Steps to Online Security
Conn Ó Muíneacháin
 
PDF
Beyond username and password it's continuous authorization webinar
ForgeRock
 
PPTX
Safenet Authentication Service, SAS
robbuddingh
 
PDF
Security 101: Multi-Factor Authentication for IBM i
Precisely
 
PDF
Ouch 201211 en
Hai Nguyen
 
PDF
FIDOs place in the identity ecosystem
wegdam
 
Google Case Study: Becoming Unphishable
FIDO Alliance
 
Security Keys Presentation.pptx
Alok Sharma
 
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
Google FIDO Authentication Case Study
FIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
Google & FIDO Authentication
FIDO Alliance
 
Solving problems with authentication
MecklerMedia
 
Understanding passwordless technologies
David Strom
 
Mobile Authentication - Moving Towards a Passwordless Future
ForgeRock Identity Tech Talks
 
OSDC 2012 | CA failures and the future of Web authentication by Dr. Christoph...
NETWAYS
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
Online privacy & security
Priyab Satoshi
 
SSL certificates
Kevin OBrien
 
Digital Signatures in the Cloud: A B2C Case Study
iText Group nv
 
Seven Simple Steps to Online Security
Conn Ó Muíneacháin
 
Beyond username and password it's continuous authorization webinar
ForgeRock
 
Safenet Authentication Service, SAS
robbuddingh
 
Security 101: Multi-Factor Authentication for IBM i
Precisely
 
Ouch 201211 en
Hai Nguyen
 
FIDOs place in the identity ecosystem
wegdam
 

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Alliance
 
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance
 
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Alliance
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Alliance
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Alliance
 
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Alliance
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

PPTX
Coupa-Overview _Assumptions presentation
annapureddyn
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Architecture of the Future (09152021)
EdwardMeyman
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
Coupa-Overview _Assumptions presentation
annapureddyn
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Architecture of the Future (09152021)
EdwardMeyman
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Software Development Company | KodekX
KodekX
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Beyond Automation: The Role of IoT Sensor Integration in Next-Gen Industries
Rejig Digital
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 

Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton

  • 1. #FIDOseminar BECOMING UNPHISHABLE TOWARDS SIMPLER, STRONGER AUTHENTICATION Alexei Czeskis Google
  • 2. Introduction and Agenda Part of the team responsible for authentication at Google Agenda • Passwords are broken • Introducing Security Key • Google’s Experience • Some numbers • We’re not quite done • How can you get started?
  • 4. Passwords are broken Phishing has become increasingly sophisticated ● More than ⅔ of incidents [in 2015] … involved phishing. With a 23% effectiveness rate* ● OTPs help against shared password, but it’s not safe to rely on them for phishing * http://www.verizonenterprise.com/DBIR/2015/ REUSED PHISHED KEYLOGGED
  • 6. Today’s solution: One Time Passwords SMS USABILITY Coverage Issues - Delay - User Cost DEVICE USABILITYOne Per Site - Expensive - Fragile USER EXPERIENCEUsers find it hard PHISHABLE German Police re: iTan: ".. we still lose money"
  • 8. Introducing Security Key Designed to solve authentication challenges • For enterprises • For consumers Based on FIDO U2F standard • Safe: Unphishable / UnMITMable • Easy: Insert and press button • Compact: One device, many services
  • 9. Simple operation 1 2 3 Userid & Password Insert, Press button Successful Sign in
  • 10. Based on Asymmetric Cryptography Core idea - Standard public key cryptography • User's device mints new key pair, gives public key to server • Server asks user's device to sign data to verify the user. • One device, many services, "bring your own device" enabled
  • 12. Deployment at Google • Enterprise use case • Mandated for Google employees • Corporate SSO (Web) • SSH • Forms basis of all authentication • Consumer use case • Available as opt-in for Google consumers • Adopted by other relying parties too: Dropbox, Github
  • 14. Time to authenticate Security Keys are faster to use than OTPs "If you've been reading your e-mail" takeaway:
  • 16. Second Factor Support Incidents Security Keys cause fewer support incidents than OTPs "If you've been reading your e-mail" takeaway:
  • 17. We're not quite done...
  • 18. Ongoing work • Wireless protocols • NFC, BLE • More browsers • Firefox, Edge, more? • More platforms • Android, Windows, OS X/iOS? • V2 of the protocol • Device-centric authentication
  • 19. How can you get started?
  • 20. U2F use cases • Internal enterprise authentication (B2B) Authenticate to your own web applications, mobile applications, etc • Authenticate to your service providers (“token necklace”) U2F works well in a non-federated environment Complete isolation between various RPs • External customer authentication Authenticate your high-value customers using U2F
  • 21. Resources • To use with Google Enable 2-Step Verification on your account Go to: https://security.google.com Click: 2-Step Verification Click on the Security Keys tab • Also use with GitHub, Dropbox • And / or play with some code https://github.com/google/u2f-ref-code https://developers.yubico.com/U2F/Libraries/List_of_libraries.h tml
  • 22. Q & A