Digital Authentication - the basics

by Dawn M. Turner (guest) on 01. August 2016

The potential for fraud is always a risk that cannot be ignored when it comes to conducting transactions. In person, an individual could present forged or altered documents that attest to an identity that does not belong to him or her. Online, an individual could also misrepresent his or her identity in a similar manner using someone else’s credentials without their permission. Here is where online user authentication is able to attest to a person or entity’s identity and ensure the validity of a transaction.

What is Authentication?

The term authentication refers to an electronic process that allows for the electronic identification of a natural or legal person. Additionally, authentication may also confirm the origin and integrity of data in electronic form, such as the issuance of a digital certificate to attest to the authenticity of a website. The overall purpose of authentication is to reduce the potential for fraud, especially in the event of an individual purposely misrepresenting their identity or through the unauthorized use of another person’s credentials.

The terms digital authentication or electronic authentication (e-authentication) synonymously refer to the process where the confidence in user identities is established and presented electronically to an information system.

The digital authentication process presents a technical challenge due to the necessity of authenticating individual people or entities remotely over a network.

Its level of security depends on the applied type of authentication, the authentication factors used, as well as the process of authentication applied.

This article describes these relevant dimensions of security in the following sections.

Authentication Factors

When authenticating an online user, there are three factor categories that may be used to assure that the user is who he or she makes a claim to be. These factor categories are:


  • Knowledge factors – these would include a user’s password, passphrase, personal identification number (pin) or a challenge response where the user would be required to answer a pre-selected security question.
  • Ownership factors – these would include something that the user has possession of, such as a bank card, a hardware or software one time password (OTP) token or a cell phone.
  • Inherence factors – these factors relate to something that a user is or does and includes biometric identifiers such as facial, fingerprint or retinal pattern recognition along with other personal trait identifiers.

Types of Authentication

The subsequent categorization lists the most frequently used types of online user authentication sorted based on increasing levels of security:

  1. Single-factor authentication - only one component out of one of the 3 factor categories is used to authenticate a person’s identity. Experience shows that one single factor does not provide sufficient protection against malicious intrusion and misuse. Therefore, as soon as financially or personally relevant transactions are involved, a higher level of security is preferable.

  2. Two-factor authentication – often referred to as 2FA, the user’s identity is confirmed by using a combination of two independent components from two different factor categories. For example, where a user has logged on to their online bank account, with their username and password, and wishes to complete an online transaction, he or she would need to enter an authentication factor in addition to the knowledge factor (username and password) that was used to log on. The additional factor must also be from a different factor category than the username and password. An online banking user would typically use an authentication mechanism from the ownership category such as an OTP device or mobile phone to receive an OTP in a text message. OTPs are dynamic passwords which can only be used once and thereby provide a strong level of protection against a range of attacks.

  3. Multi-factor authentication is similar to 2FA, but it can combine more than 2 authentication factors for enhanced security, whereas 2FA only uses two different factors.

  4. Strong authentication – this type is often used as synonym for multi-factor authentication or 2FA. However, unlike multi-factor authentication and 2FA, strong authentication mandatorily requires non replicable factors or the use of digital certificates to provide a higher level of authentication for users. If those criteria are fulfilled, multi-factor authentication and 2FA are able to provide strong authentication.
    The European Central Bank (ECB) defines strong customer authentication as “a procedure based on two or more of the three authentication factors, 1. Knowledge, 2. Ownership, and 3. Inherence. According to the ECB definition, the individual elements that are chosen for strong authentication factors must be mutually independent and at least one must be  “non-reusable and non-replicable (except for inherence), and not capable of being surreptitiously stolen via the internet.” What does that mean? Independence is relatively easy to grasp - if one component is related to the other, hacking one means all components are tampered with. Non-replicability implies the aspect of time or usage. Used once it cannot be used again. An example is a one-time-password which is only valid during a short period of time (e.g., 30 seconds).
    In the United States, the National Information Assurance (IA) Glossary produced by the Committee on National Security Systems defines strong authentication similarly, requiring “multiple factors for authentication and advanced technology, such as dynamic passwords or digital certificates to verify an entity’s identity.” Dynamic passwords include the aspect of time. In deviation to the ECB definition, the IA also accepts cryptographic means such as a public key certificates to co-authenticate a user.

Enrolment and Authentication Process

The American National Institute of Standards and Technology (NIST) has outlined a quite generic digital authentication model, which can be used as a basic explanation model for the authentication process, regardless of the geographical region or area of jurisdiction.


NIST-Authentication-Reference-Process-Cryptomathic.jpg

Source: NIST Authentication Guideline (2016)

In the NIST model, an individual (applicant) applies to a credential service provider (CSP) and thus initiates the enrolment process. Once the CSP has successfully proven the applicant’s identity, he or she becomes a “subscriber”, and an authenticator (e.g., token) as well as a corresponding credential, such as a username, are established between the CSP and the applicant (now owning the the role of the subscriber).

The CSP has the task of maintaining the credential including its status and all enrolment data over the whole lifetime of the credential. The subscriber needs to maintain the authenticator(s). This first part of the NIST reference model is applied in any enrollment process, where subsequent authentication is required, e.g., when a bank account is created or when a person signs up in an e-government process.

Once the applicant has become a “subscriber”, he or she can perform online transactions within an authenticated session, conducted with a relying party. In such a transaction, the person holds the role of a claimant, proving to a verifier the possession of one or more authenticators. Verifier and relying party might be the same or alternatively two independent entities. If verifier and relying party are separate, the verifier has to provide assertion about the subscriber to the relying party. Subsequent to this this assertion, the relying party may then initiate the transaction process.

In the following, a typical payment sequence illustrates this reference process:
The account owner (“subscriber) wants to initiate a transaction.  He or she first needs to prove through one or more authenticators that he or she, who claims to be the account owner (“claimant”) actually is the person he claims to be (“subscriber). The validation is done by a “verifier” who verifies the authenticators at the “credential service provider” and after validation gives authentication assertion to the transaction department of the bank (relying party). In many banks the entities “verifier” and “credential service provider” may well be entities within the the bank.


E-government processes are conducted in a similar way (e.g. the application for a passport). But in many cases, the “credential service providers” are external entities.

As already described in the section on types of authentication, this generic reference process can be implemented depending on the requirements and areas of jurisdiction.

Conclusion

The burden of fraudulent transactions falls upon individuals, businesses and financial institutions with losses that result in costs passed down to consumers along with costs related to identity theft. Authentication is one means to protect online transactions, along with their sender or recipient from falling victim to fraud.

Other concepts such as digital signing can  also leverage (strong) authentication to achieve better security, data integrity and non-repudiation for digital transactions.

New Call-to-action

References and Further Reading

Image:  StartupStockPhotos.com (CC0 Licence), Artwork by VentureSkies

Want to know how we can help ?

Get in touch to better understand how our solutions secure ecommerce and billions of transactions worldwide.