UNLIMITED

Linux Format

Understand and deploy security keys

Usernames and passwords were originally designed to be proof that the person trying to log in is who they say they are. Interestingly, Richard Stallman famously ran his first systems with no passwords because “it hindered collaboration.” This was a brave choice even back before the evolution of the networks as we know them today.

The username/password combo used to be sufficient proof of identity to enable access. Things are different these days. With the vast array of password and account thefts that occur, a simple username and password combination is no longer sufficiently secure. This is especially so when considering the ability to brute-force stolen password hashes using powerful cloud GPU compute to reverse-engineer a password. Anything of any significant value – either financially or otherwise – should be protected by as much security as can be thrown at it.

Salty hashes

Most security-aware sites now use salted hashes. These are one-way functions (akin to physical trap doors if you will) that enable developers to encrypt passwords easily in terms of CPU time, but incredibly hard to decrypt. To reverse engineer all the password combinations would be a futile, expensive and lengthy undertaking in a properly salted and hashed environment. Salting refers to adding a second additional and unique value to the encryption key to make reversing the password hash more difficult, because it can’t be run against pre-built tables of hashes. More information about salts can he found at https://en.wikipedia.org/wiki/Rainbow_table.

To enhance security, the concept of software and hardware tokens was introduced. These introduce a multiple factor of authentication, and many others. Phone-based security can be fine for most users, but it still doesn’t do much for security beyond website logins. Hardware tokens take things a step further because they enable the usage of secure public/private encryption keys to extend the ability to prove an identity or even sign code, emails and so on.

You’re reading a preview, subscribe to read more.

More from Linux Format

Linux Format1 min read
Make A Date!
Italo Vignoli is one of the founders of LibreOffice and the Document Foundation. “In February, you can meet a representative of the project at FOSDEM in Brussels, where LibreOffice will have a booth and a devroom where LibreOffice Technology will be
Linux Format2 min read
Is Valve Starting An OS War With Microsoft?
THIS ISSUE: Valve to open up? » Shiny new Chrome » Torvalds’s tirade » Future Flathub fees » Mozilla makeover Valve’s recent update to its branding guidelines has sparked online speculation about whether the company plans to release SteamOS 3 on othe
Linux Format1 min read
Mozilla Pixel Brand Refresh
Mozilla’s T. rex design is no more. Working with the community and branding firm Jones Knowles Ritchie (JKR), the non-profit has overhauled its brand. Chief among the changes is an ASCII art-style logo in the shape of a flag. The new brand identity a

Related