Blog Posts Business Management

Blockchain vs The Password

Blog: Capgemini CTO Blog

The obituary of the password has been written and re-written.   After all, we’re all aware of the shortcomings of this humble form of authentication.  Chances are you’ve had to enter at least one password in order to look at this article online.  Though they can be convenient methods of resolving the question of who is allowed to access a given resource, some limitations can be as follows:

It could be argued though that these are not limitations of the password per se, more issues with:

There are a number of different alternatives to password-only systems, including biometrics and the use of multi-factor authentication. Now authentication systems are being constructed on blockchain technology, which is designed on the premise that a decentralized system is better than a centralized one. Multiple, publicly visible, shared copies of data exist across the blockchain and all transactions are stored as blocks and are reconciled among the members at a set frequency.  This prevents an attack on an individual server in the blockchain from compromising the data as a whole.

REMME is a company based in Ukraine, which saw first-hand how devastating cyberattacks can be, when the electricity system was disabled by hackers in December 2015.

REMME’s technology leverages a distributed public key infrastructure to authenticate users and devices. Instead of a password, REMME gives each device a specific SSL certificate. The certificate data is managed on the Blockchain, by associating a bitcoin address with a certificate.  This makes it extremely difficult for malicious hackers to use fake certificates. There is also the capacity for certificates to be revoked using CRLs (Certificate Revocation List) or via OCSP (Online Certificate Status Protocol).  The platform also uses two-factor authentication to further enhance security for its users.  It appears to have some traction with energy companies to improve their security and provide a defence from cyberattacks.

This puts REMME into the IDaaS (Identity as a Service) category.  The company sees its key advantages over the most common existing solutions:

What are the breadth of use cases for this type of authentication technology?  For those scenarios where passwords can be seen as a weak link when utilised on their own, this infrastructure may have some possibilities.  The use of two-factor authentication also provides a more secure method of authentication.  After all, if you lose your SSL certificate (or it’s stolen), the system you’re trying to access is just as vulnerable as one with a compromised password.

In conclusion, the password has survived many attempts to kill it off, and, in my opinion will continue to do so.  Its ease of implementation and management, especially in low risk systems mean that it will be the authentication method of choice for some time to come.  However, the advent of blockchain technology has given rise to different uses that allow applications to make use of its security features (e.g. being more difficult to hack than a conventional system).  This can make the application of this technology a major player when considering authentication methods that protect highly sensitive assets.

References

https://www.forbes.com/sites/omribarzilay/2017/08/21/3-ways-blockchain-is-revolutionizing-cybersecurity/#2d10297b2334

 

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/blockchain-vs-the-password/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×