Methods of User Authentication - Winter Term 2025/26

#Lecture #Bachelor #Master
Last update: January 29, 2026

  • 1 October 16, 2025: Kickoff

  • User Authentication
    • Motivation: The Human Factor in Authentication Systems
      • Human Factors and Selection Bias
      • Theoretical (Uniform) vs. Empirical (Real-World) Distributions
    • Authentication Factors: Knowledge / Possession / Biometrics
    • Authenticity: Product / Message / User
    • Definitions: Identification / Authentication / Authorization / Access Control
  • Course Structure & Logistics
Authentication Factors

  • 2 October 23, 2025: Passwords 101

  • Passwords
    • A Simple Password Protocol (Enrollment & Verification)
      • Password Transmission: Plaintext / Over an Encrypted Channel / Hashing / TLS
    • Threats and Problems with Passwords
      • Attacks on the Server / User's Machine / Network / The User
  • Password Storage
    • Hashing / Salting / Pepper / Iterative Construction / Keyed-Hashing
    • Time-Memory Tradeoffs: Hashchains & Rainbow Tables
  • Password Guessing
    • Anatomy of Guessing
    • GPU-Based Password Cracking
  • Password Strength
    • What Makes a Password Strong?
    • Zipf Distribution
    • Online–Offline Chasm
Password Strength

  • 3 October 30, 2025: Passwords Attacks

  • Password Strength
    • Entropy
    • Estimating Strength of Human-Chosen Passwords
      • Perfect Knowledge
      • LUDS Heuristics
      • Password Models (Data-Driven Methods): Markov / PCFG / Neural Networks
    • Password Strength Meters
    • Password (Composition / Expiration) Policies
      • Practical Recommendations for Stronger, More Usable Passwords
  • Password Attacks
    • False-Consensus Effect
    • Coping Strategies: Memorability, and Reusing Passwords
    • Weak Passwords
    • Phishing
      • Why Phishing Works
      • Long URLs / Homograph Attacks / Browser-in-the-Browser Attacks
      • Blocklisting / Lookalike Domains / Phishing Simulations
    • Password Reuse
      • Credential Stuffing Attacks
      • Reuse Notifications
      • Measuring Reuse at UChicago
Password Reuse
References

  • 4 November 6, 2025: Password Defenses - Part 1

  • Password Defenses
    • Two-Factor Authentication (2FA)
      • SMS / TOTP / App / Push / Security Keys (A Short Intro Only)
      • 2FA Phishing (Gmail Confidential Mode)
      • MFA Fatigue
      • Recovery Mechanisms
    • Password Managers
      • Common Concerns
      • Adoption
      • Cloud-Based Password Managers
      • Cracking-Resistant Constructions
      • Password-Based Encryption (PBE)
      • Key Derivation Functions (KDFs)
Reinforcing Passwords

  • 5 November 13, 2025: Password Defenses - Part 2

  • Password Defenses
    • Password Manager
      • Misconception of 2FA for PBE (Password-Based Encryption)
      • Two-Secret Key Derivation (2SKD)
      • Emergency Kit
      • Biometric Unlock
      • SSO (Single Sign-On) and Passkey-Based Constructions
      • Autofill / Phishing Protection / Generation
      • Authentication in the Livingroom
      • Adoption: User Groups / Non-Users / Built-In / 3rd Party Users
      • Website Interactions
    • Risk-Based Authentication (RBA)
    • Login Notifications
      • Granted Access / Additional Challenge / Block Access
    • Breach Alerting
      • Compromised Credential Checking (C3)
      • A Well-Known URL for Changing Passwords
Login Notification

  • 6 November 20, 2025: Password Protocols

  • Password Protocols
    • Authentication Protocol Families
    • Challenge–Response Protocols
    • HTTP (Basic) Authentication
    • Federated Identity
      • Single Sign-On (SSO)
      • Kerberos
      • SAML (Security Assertion Markup Language)
      • OAuth 2.0
      • OpenID Connect (OIDC)
      • Consent Screens
      • Social Logins
    • Password-Authenticated Key Exchanges (PAKEs)
      • Motivating Example: A Simple and Insecure Protocol
      • Diffie-Hellman Key Exchange
      • Types
      • History
      • Cloudbleed
      • EKE / SRP / OPAGUE
Password Protocols

  • 7 November 27, 2025: Hardware Tokens and Biometrics - Part 1

  • Hardware Tokens
    • Phishing Resistance
    • Token Protocols
    • U.S. Common Access Card (CAC)
    • Hardware Security Keys in Companies
    • Security Keys and Smartphones
    • Enterprises vs. End-Users
    • Physical Side-Channel Attacks
  • Biometrics
    • Identification vs. Authentication
    • Examples: Physiological / Behavioral Biometrics
    • Application Domains
    • Fundamental Properties
    • System Architecture
    • Metrics
    • Threat Models
    • Biometric Device Unlock
    • Adoption and Perceptions
Authenticator Bloat

  • 8 December 4, 2025: Biometrics - Part 2 and Passwordless Authentication - Part 1

  • Biometrics
    • Local Authentication
    • Biometric Storage
    • Behavioral Biometrics
    • Continuous Authentication
    • Multimodal Biometrics
      • Case Study: ZEBRA
    • Fingerprint Recognition
      • Sensors
      • Minutiae-Based Fingerprint Recognition
      • Matching / Generalized Hough Transformation
    • Face Recognition
      • Sensors
      • Algorithms
      • Case Study: Face ID
    • Privacy and Societal Issues
      • Law Enforcement and Biometrics
      • Ethical, Legal, and Societal Aspects
  • Passwordless Authentication
    • Traditional Approaches (SSO, Magic Link, App-Based, QR Codes)
    • FIDO Ecosystem
      • U2F
      • FIDO2
      • Passkeys
    • Simplified FIDO Protocol
    • Advantages and Misconceptions
Continuous Authentication

  • 9 December 11, 2025: Passwordless Authentication - Part 2 and Graphical Passwords - Part 1

  • Passwordless Authentication
    • Authenticators and Key Storage
    • End-to-End Encryption (E2EE)
      • PIN Protection and Rate-Limiting
    • Local Authentication
      • User Verification
      • User Presence
    • Platform Support (Windows, macOS, Linux)
    • FIDO Credentials
      • Non-Discoverable/Non-Resident/Server-side Credentials
      • Discoverable/Resident Credentials/Passkeys
    • Cross-Device Authentication (CDA)
    • Phishing Resistance
    • Attacks Against Passkeys
      • Malware and Browser Extensions
      • Mis-/Double-Binding Attacks
      • No Security Gain (Yet): Deleting the Password
    • Adoption Challenges
      • Regulations & Requirements
      • Usability
      • Technical
      • Universality
      • Organizational
    • Enrollment Strategies / Nudging
      • Convincing Users of Passkeys
      • Automatic Passkey Upgrades (Conditional Create)
  • Graphical Passwords
    • Classification
    • Selection Bias
    • Recall-Based Schemes
      • Draw-A-Secret (DAS)
      • Pass-Go
      • Android Unlock Pattern
      • EmojiAuth
Graphical Passwords

  • 10 December 18, 2025: Graphical Passwords - Part 2 and Mobile Authentication

  • Graphical Passwords
    • Cued-Recall
      • PassPoints
      • Persuasive Cued Click-Points (PCCP)
      • Windows Picture Password
      • GeoPass
      • BlackBerry's Picture Password
      • GeoFallbackAuth (GFA)
    • Recognition
      • Passfaces
      • Déjà Vu
      • Story
  • Mobile Authentication
    • Screen Lock Mechanisms
      • Knowledge-Based Authentication (PINs, Patterns, Mobile Passwords)
      • Biometric-Based Reauthentication
    • How Phones Are Broken in Practice
      • Apple-FBI Encryption Dispute
      • Bypassing Rate Limiting
      • NAND Mirroring
      • Commercial Forensic Tools (e.g., ElcomSoft, Grayshift, Cellebrite)
    • Android Unlock Patterns
      • Android Unlock Patterns
      • User Choice and Bias
      • Demographic Influences
      • Grid Size Comparisons (3×3 vs. 4×4)
      • Pattern Strength Meters
    • Mobile Passwords
      • Text Passwords on Mobile Devices
      • Usability and Security Tradeoffs
    • Attacks on Mobile Authentication
      • Shoulder Surfing Attacks
      • Guessing Attacks
      • Rate Limiting
      • Other Attacks: Juice Jacking, Smudge, Thermal, Petri Dish
    • PINs and Passcodes
      • PINs on Mobile Devices
      • 4- vs. 6-digit PINs
      • PIN Blocklists
      • Security vs. Usability
Rate-Limiting
References

  • 11 January 8, 2026: Evaluating and Comparing Schemes

  • Evaluating and Comparing Authentication Schemes
    • Evaluating Usability and Security
      • Theoretical Analysis vs. Empirical Evidence
      • User Studies
      • Self-Report vs. Measured Data
      • Biases
      • Authentication Is Not a Primary Task
      • Real-World Behavioral Data
      • Quantitative vs. Qualitative Evidence
      • Metrics Without Context Are Dangerous
    • Usability Scales and Standardized Questionnaires
      • System Usability Scale (SUS)
      • User Experience Questionnaire (UEQ, UEQ-S)
      • NASA Task Load Index (NASA-TLX)
    • The UDS Framework
      • Usability
      • Deployability
      • Security
      • Comparing Authentication Schemes
Evaluating Authentication Schemes
References

  • 12 January 15, 2026: Fallback Authentication

  • Fallback Authentication
    • Motivation & Definitions
      • Why Users Are Setup to Fail
      • Scaling the Problem to Billion of Users
    • Fallback Methods
      • Out-of-Band Communication (Email, SMS)
      • Personal Knowledge Questions (PKQs)
      • Social / Trustee-Based Authentication
      • Recovery Keys and 2FA Backup Codes
      • Reusing Active Sessions
      • Helpdesk & Soft-Factors
      • Delegated Account Recovery (DAR)
      • FIDO & Temporary Access Passes
    • Comparison and Long-Term Studies
      • Successful Resets
      • Reset Times
      • Usability Rating
    • Best Practices
      • Providing Multiple Fallback Options
      • Combining Factors
      • User Awareness and Transparency
      • Keeping Fallback Information Up to Date
      • Ask to Enroll Additional Fallback Factors
      • Abuse Prevention and Rate Limiting
      • Denying Recovery Can Be the Right Choice
    • Attacks
      • Guessing Attacks
      • Channel & Infrastructure Abuse
      • Human & Process Attacks
Placeholder
References

  • 13 January 22, 2026: Exam Preparation

  • Exam Preparation
    • Expectation and Scope
    • Definitions
    • Logistics
    • Practice Questions
    • Q&A
  • Research/Misc
    • Implicity Memory-Based Authentication
      • Degraded Images
      • Serial Interception Sequence Learning (SISL)
      • Mooney Images
      • Contextual Cueing and Semantic Priming
    • Brain–Computer Interfaces
      • Oddball Paradigm and the P300 Speller
      • Pass-Thoughts
      • Brainwave Authentication
    • Keystroke Dynamics
      • Password Recovery from Inter-Keystroke Timings
Exam Preparation
  • Cybersecurity in Organizational Practice
    • Human-Centred Security Problem Space
      • Bad Security Design
      • User Blaming & Responsibility Shift
      • Lack of Security Knowledge
      • Bad Communication & Security Myths & FUD
      • Misaligned Incentives
    • Organizations & Cybersecurity
      • Sociotechnical Systems
      • Security as a Secondary Task
      • Drivers for Organizational Cybersecurity
      • Norms, Regulations, Frameworks
    • Authentication in Organizational Practice
      • Legacy Systems & Active Directory
      • Usability vs. Work Reality
      • Identity & Access Management (IAM)
    • Security Regulations & Standards
      • US National Institute of Standards and Technology (NIST)
      • UK National Cyber Security Centre (NCSC)
      • European Union Agency for Cybersecurity (ENISA)
      • German Federal Office for Information Security (BSI)
      • ISO/IEC 27001
      • Payment Card Industry Data Security Standard (PCI DSS)
Placeholder
References

  • Not Covered (Future Work)

  • Missing / Exciting New Content (Random Order)
    • Kerckhoffs's principle
    • Device Bound Session Credentials (DBSC)
    • a11y: Blind and Visually Impaired Users
    • QR Code-Based Attacks
    • Large Language Models and Passwords
    • Quantum Guessing
    • Passphrases
    • System-Assigned Passwords
    • Honey Words
Future Work
References