It has been almost a couple of months since my last Real World Applications of Cryptocurrencies post, but its back with a bang. Following on from my previous post on Art & Collectibles & the Codex Protocol, which you can find here, I will be discussing how User Authentication will be disrupted with the emergence of the blockchain and cryptocurrencies.
Cybercrime is a major problem in today’s tech-driven world, and it’s only getting worse; it’s the fastest growing crime in the United States. The cyber security market is expanding rapidly, purely driven by the rise in cybercrime. According to a Cybersecurity Ventures report, the cyber security industry saw a growth of over 350% between 2004 and 2017. It grew from $3.5Bn to $120Bn in just over a decade with governments and institutions investing billions upon billions in cyber security.
The report also points out how cybercrime will cost the world $6Tn in 2021, an increase of 200% from the $3Tn figure in 2015. Digging a bit deeper into numbers, in a recent survey, the UK Government, reported that over 43% business have “experienced a cyber security breach or attack” in the past year alone.
As mentioned in the previous section, governments and companies spend billions on cyber security. Cyber attacks can come in a multitude of forms but in this post I will focus on user authentication attacks. These include (definitions taken from techopedia and rapid7):
Currently, usernames & passwords are the predominant way to authenticate users. Unfortunately, due to human nature, password-based authentication is extremely weak. Humans are not great at creating effective passwords and very often choose easy-to-obtain passwords. On occasion, when people do create effective passwords, these are often written on a piece of paper or an electronic document making them significantly less secure. Additionally, passwords are likely to be re-used for multiple logins or infrequently changed.
Just to give you an idea how serious this problem is, Verizon’s 2016 Data Breach Investigations Report found that 63% of confirmed data breaches involved weak, default or stolen passwords.
In order to solve this problem, multifactor authentication (MFA) has been introduced in many places. MFA is the process in which you need to confirm your identity using additional ‘factors’ (using an app on your phone, a code via SMS, etc.). Unfortunately, this secondary security measure, isn’t fool proof either, as there have been numerous cases of accounts being compromised even with MFA enabled.
An alternative to 2FA is certificate based authentication, in which users are securely authorized by exchanging a digital certificate instead of a username and password. This solves some of the issues with username & password authentication (like phishing, MITM) but not everything.
Certificate based authentication is built using a centralized Public Key Infrastructure (PKI). The backbone of PKIs are digital certificates (that can only be issued by centralized authorities) which are used to cryptographically link ownership of a public key with the entity that owns it. This offers stronger security (but not fool proof) as a trusted part mutually authenticates the client and server through a secure channel. Unfortunately, these certificates are centrally managed and vulnerable to cyber attacks. You can find more information on digital certificates and PKIs, here.
To conclude this section, there are two major issues with user authentication today; the weakness of passwords and the centralized instances of PKI.
REMME caught my attention when researching this particular problem.
REMME is a solution leveraging an open source protocol whilst utilizing the blockchain to replace traditional centralized instances of Public Key Infrastructure (such as Certificate Authorities, Registration Authorities, Lightweight Access Directory Protocol etc.). It’s doing so with a blockchain based Network of Trust, built on top of Hyperledger Sawtooth.
In simpler terms, REMME utilizes the blockchain in order to provide the ability to log in to any service (that implements REMME) more securely by getting rid of the need for passwords.
REMME is a Ukrainian company launched in 2015 by Alex Momot and Kate Pospelova and was the winner of the Microsoft Blockchain Incentive award in 2017. On October 2017, REMME launched a pilot program for companies looking to trial their ecosystem. Since then, it has attracted interest from almost 300 global enterprises coming from a variety of industries, including, Ukrinmash, Infopulse, Hotmine, Constitutional Health and Changelly.
Simply put, REMME is creating a distributed Public Key Infrastructure (PKId) with the blockchain acting as central authority.
REMME will provide the ability for users to generate/revoke their own certificates. Once these are generated, nodes will need to validate the transaction. Upon validation, a unique identifier of the certificate (it’s hash), it’s state (whether it was issued or revoked), the public key and expiration date, are stored on the blockchain. This essentially creates an immutable record to validate certificates required for authentication.
When a user wishes to authenticate, they will be able to do so with a simple click. A check will then be performed on the blockchain to verify that the device’s certificate is correct with entry granted entry once verified.
You might be wondering what happens if this device gets lost or stolen? The REMME team provides an excellent explanation with what will happen in this scenario, here.
To complement their protocol, the REMME team is building a number of Decentralized Applications (dApps), including:
Additionally, REMME is creating an SDK which gives developers the ability to create their own dApps on the REMME blockchain.
As a matter of fact, REMME has just rolled out a part of their solution on their testnet. This includes the following:
You can find more information about the above and their testnet release, here.
As a matter of fact, REMME’s testnet contains all necessary functionality for the complete life-cycle of digital certificates. REMME invites developers to explore how the technology works and compliment the already existing use cases by implementing their own ideas on the protocol.
The REMME team has created a brilliant video showing how it all comes together, which you can find below.
To keep up to date with their latest developments, make sure you visit their website and join their community. If you want to dig even deeper into their technology, make sure to check out their blog at REMME.
By introducing the PKId and a suite of dApps to accommodate it, REMME is killing 2 birds with 1 stone — username & passwords weakness and the centralized nature of today’s PKIs. It is in prime position to solve the issues discussed above (and improve upon them), in the following ways:
You can find a full list of cyber attacks REMME can protect against, here.
REM will be central to all operations in the ecosystem and will act as a utility token to access PKId and the dApps built on top of it. REM can be used in the following ways:
If you enjoyed this post, please feel free to 👏 clap 👏 many times (you know you want to!), give my blog a 👣 follow 👣 and 🤲 share 🤲 with your friends. There’s a limit of 👏 50 claps 👏 you can give to each post, so I urge you not to try and exceed that limit… you might break Medium!
If I still have your attention, please leave a comment and let me know what else you would like to see me writing about. You can find links to my social media and sign up to my newsletter below.
You can also show your support by donating to the following address:ETH: 0x4c7195E074cf0Ab6F77Bdb7C97Fd2567066Bb712
Disclaimer: All information and data on this blog post is for informational purposes only. My opinions are my own. I do not provide personal investment advice and I am not a qualified licensed investment advisor. I make no representations as to the accuracy, completeness, suitability, or validity, of any information. I will not be liable for any errors, omissions, or any losses, or damages arising from its display or use. All information is provided as is with no warranties and confers no rights.