{
"ConformanceCriteria": [
{
"Description": "CSPs creating look-up secret authenticators SHALL use an approved random bit generator to generate the list of secrets and SHALL deliver the authenticator securely to the subscriber. Look-up secrets SHALL have at least 20 bits of entropy. Look-up secrets MAY be distributed by the CSP in person, by postal mail to the subscriber's address of record, or by online distribution. If distributed online, look-up secrets SHALL be distributed over a secure channel.",
"Number": 1,
"Citations": [{
"Description": "Section 5.1.2.1",
"Source": {"$ref": "#source-1395928943"}
}],
"$id": "criterion1",
"Name": "C1"
},
{
"Description": "Look-up secret verifiers MUST adhere to numerous requirements specified in detail within NIST 800-63-3<\/a>.",
"Number": 2,
"Citations": [{
"Description": "Section 5.1.2.2",
"Source": {"$ref": "#source-1395928943"}
}],
"$id": "criterion2",
"Name": "C2"
}
],
"AssessmentSteps": [
{
"ConformanceCriteria": [{"$ref": "#criterion1"}],
"Artifacts": [{
"Description": "Provide evidence (e.g. policies, risk assessment documentation) that the use of look-up secrets adheres to the mandatory requirements.",
"Name": "A1"
}],
"Description": "Does all use of look-up secrets meet the criteria specified in NIST 800-63-3 (approved random generation, secure delivery, and sufficient entropy)?",
"Number": 1,
"$id": "Look-UpSecrets",
"Name": "Look-Up Secrets"
},
{
"ConformanceCriteria": [{"$ref": "#criterion2"}],
"Artifacts": [{
"Description": "Provide evidence (e.g. policies, risk assessment documentation) that the look-up secret verifier adheres to the mandatory requirements.",
"Name": "A1"
}],
"Description": "Does the look-up secret verifier meet the criteria specified in NIST 800-63-3<\/a>.",
"Number": 2,
"$id": "Look-UpSecretVerifiers",
"Name": "Look-Up Secret Verifiers"
}
],
"$TMF_VERSION": "1.4",
"IssuanceCriteria": "yes(ALL)",
"Metadata": {
"PublicationDateTime": "2019-04-05T00:00:00.000Z",
"Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authentication---use-of-look-up-secret/1.0/",
"Description": "Lookup Secrets are shared secrets between the claimant and CSP that the claimant provides to the CSP as an authentication factor. The claimant either is prompted for a specific secret or provides one from a set they have and it is no longer valid. Use of lookup secrets must adhere to the rules found within NIST 800-63-3B: 5.1.2<\/a>.",
"Version": "1.0",
"LegalNotice": "This artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an \"AS IS\" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
"TrustmarkDefiningOrganization": {
"Identifier": "https://trustmarkinitiative.org/",
"PrimaryContact": {
"Email": "help@trustmarkinitiative.org",
"Telephone": "555-555-5555",
"Kind": "PRIMARY",
"WebsiteURL": "https://trustmarkinitiative.org/",
"Responder": "Trustmark Support"
},
"Name": "Trustmark Initiative"
},
"Name": "Authentication - Use of Look-Up Secret"
},
"Terms": [
{
"Definition": "To make contact with one or more discrete functions of an online, digital service.",
"Name": "Access"
},
{
"Definition": "An attack on the authentication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Examples of active attacks include man-in-the-middle (MitM), impersonation, and session hijacking.",
"Name": "Active Attack"
},
{
"Definition": "The validated and verified location (physical or digital) where an individual can receive communications using approved mechanisms.",
"Name": "Address of Record"
},
{
"Definition": "A subject undergoing the processes of enrollment and identity proofing.",
"Name": "Applicant"
},
{
"Definition": "Federal Information Processing Standard (FIPS)-approved or NIST recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.",
"Name": "Approved Cryptography"
},
{
"Definition": "A statement from a verifier to an RP that contains information about a subscriber. Assertions may also contain verified attributes.",
"Name": "Assertion"
},
{
"Definition": "A data object, created in conjunction with an assertion, that identifies the verifier and includes a pointer to the full assertion held by the verifier.",
"Name": "Assertion Reference"
},
{
"Definition": "Two related keys, comprised of a public key and a private key, that are used to perform complementary operations such as encryption and decryption or signature verification and generation.",
"Name": "Asymmetric Keys"
},
{
"Definition": "An unauthorized entity's attempt to fool a verifier or RP into believing that the unauthorized individual in question is the subscriber.",
"Name": "Attack"
},
{
"Definition": "A party, including an insider, who acts with malicious intent to compromise a system.",
"Name": "Attacker"
},
{
"Definition": "A quality or characteristic ascribed to someone or something.",
"Name": "Attribute"
},
{
"Definition": "A packaged set of attributes, usually contained within an assertion. Attribute bundles offer RPs a simple way to retrieve the most relevant attributes they need from IdPs. Attribute bundles are synonymous with OpenID Connect scopes.",
"Name": "Attribute Bundle"
},
{
"Definition": "A statement asserting a property of a subscriber without necessarily containing identity information, independent of format. For example, for the attribute \"birthday,\" a reference could be \"older than 18\" or \"born in December.\"",
"Name": "Attribute Reference"
},
{
"Definition": "A complete statement asserting a property of a subscriber, independent of format. For example, for the attribute \"birthday,\" a value could be \"12/1/1980\" or \"December 1, 1980.\"",
"Name": "Attribute Value"
},
{
"Definition": "See authentication<\/em>.",
"Name": "Authenticate"
},
{
"Definition": "An encrypted communication channel that uses approved cryptography where the connection initiator (client) has authenticated the recipient (server). Authenticated protected channels provide confidentiality and MitM protection and are frequently used in the user authentication process. Transport Layer Security (TLS) is an example of an authenticated protected channel where the certificate presented by the recipient is verified by the initiator. Unless otherwise specified, authenticated protected channels do not require the server to authenticate the client. Authentication of the server is often accomplished through a certificate chain leading to a trusted root rather than individually with each server.",
"Name": "Authenticated Protected Channel"
},
{
"Definition": "Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to a system's resources.",
"Name": "Authentication"
},
{
"Definition": "The three types of authentication factors are something you know<\/em>, something you have<\/em>, and something you are<\/em>. Every authenticator has one or more authentication factors.",
"Name": "Authentication Factor"
},
{
"Definition": "The process of confirming the claimant's intent to authenticate or reauthenticate by including a process requiring user intervention in the authentication flow. Some authenticators (e.g., OTP devices) establish authentication intent as part of their operation, others require a specific step, such as pressing a button, to establish intent. Authentication intent is a countermeasure against use by malware of the endpoint as a proxy for authenticating an attacker without the subscriber's knowledge.",
"Name": "Authentication Intent"
},
{
"Definition": "A defined sequence of messages between a claimant and a verifier that demonstrates that the claimant has possession and control of one or more valid authenticators to establish their identity, and, optionally, demonstrates that the claimant is communicating with the intended verifier.",
"Name": "Authentication Protocol"
},
{
"Definition": "An exchange of messages between a claimant and a verifier that results in authentication (or authentication failure) between the two parties.",
"Name": "Authentication Protocol Run"
},
{
"Definition": "A generic term for any secret value that an attacker could use to impersonate the subscriber in an authentication protocol. These are further divided into short-term authentication secrets<\/em>, which are only useful to an attacker for a limited period of time, and long-term authentication secrets<\/em>, which allow an attacker to impersonate the subscriber until they are manually reset. The authenticator secret is the canonical example of a long-term authentication secret, while the authenticator output, if it is different from the authenticator secret, is usually a short-term authentication secret.",
"Name": "Authentication Secret"
},
{
"Definition": "Something the claimant possesses and controls (typically a cryptographic module or password) that is used to authenticate the claimant's identity. In previous editions of SP 800-63, this was referred to as a token<\/em>.",
"Name": "Authenticator"
},
{
"Definition": "A category describing the strength of the authentication process.",
"Abbreviations": ["AAL"],
"Name": "Authenticator Assurance Level"
},
{
"Definition": "The output value generated by an authenticator. The ability to generate valid authenticator outputs on demand proves that the claimant possesses and controls the authenticator. Protocol messages sent to the verifier are dependent upon the authenticator output, but they may or may not explicitly contain it.",
"Name": "Authenticator Output"
},
{
"Definition": "The secret value contained within an authenticator.",
"Name": "Authenticator Secret"
},
{
"Definition": "A category of authenticators with common characteristics. Some authenticator types provide one authentication factor, others provide two.",
"Name": "Authenticator Type"
},
{
"Definition": "The property that data originated from its purported source.",
"Name": "Authenticity"
},
{
"Definition": "An entity that has access to, or verified copies of, accurate information from an issuing source such that a CSP can confirm the validity of the identity evidence supplied by an applicant during identity proofing. An issuing source may also be an authoritative source. Often, authoritative sources are determined by a policy decision of the agency or CSP before they can be used in the identity proofing validation phase.",
"Name": "Authoritative Source"
},
{
"Definition": "A decision to grant access, typically automated by evaluating a subject's attributes.",
"Name": "Authorize"
},
{
"Definition": "Communication between two systems that relies on a direct connection (allowing for standard protocol-level proxies), without using redirects through an intermediary such as a browser. This can be accomplished using HTTP requests and responses.",
"Name": "Back-Channel Communication"
},
{
"Definition": "The assertion a party presents as proof of identity, where possession of the assertion itself is sufficient proof of identity for the assertion bearer.",
"Name": "Bearer Assertion"
},
{
"Definition": "An association between a subscriber identity and an authenticator or given subscriber session.",
"Name": "Binding"
},
{
"Definition": "Automated recognition of individuals based on their biological and behavioral characteristics.",
"Name": "Biometrics"
},
{
"Definition": "An authentication protocol where the verifier sends the claimant a challenge (usually a random value or nonce) that the claimant combines with a secret (such as by hashing the challenge and a shared secret together, or by applying a private key operation to the challenge) to generate a response that is sent to the verifier. The verifier can independently verify the response generated by the claimant (such as by re-computing the hash of the challenge and the shared secret and comparing to the response, or performing a public key operation on the response) and establish that the claimant possesses and controls the secret.",
"Name": "Challenge-Response Protocol"
},
{
"Definition": "A subject whose identity is to be verified using one or more authentication protocols.",
"Name": "Claimant"
},
{
"Definition": "The physical location asserted by a subject where they can be reached. It includes the individual's residential street address and may also include their mailing address. For example, a person with a foreign passport living in the U.S. will need to give an address when going through the identity proofing process. This address would not be an \"address of record\" but a \"claimed address.\"",
"Name": "Claimed Address"
},
{
"Definition": "An applicant's declaration of unvalidated and unverified personal attributes.",
"Name": "Claimed Identity"
},
{
"Definition": "An interactive feature added to web forms to distinguish whether a human or automated agent is using the form. Typically, it requires entering text corresponding to a distorted image or a sound stream.",
"Abbreviations": ["CAPTCHA"],
"Name": "Completely Automated Public Turing test to tell Computers and Humans Apart"
},
{
"Definition": "An object or data structure that authoritatively binds an identity - via an identifier or identifiers - and (optionally) additional attributes, to at least one authenticator possessed and controlled by a subscriber. While common usage often assumes that the subscriber maintains the credential, these guidelines also use the term to refer to electronic records maintained by the CSP that establish binding between the subscriber's authenticator(s) and identity.",
"Name": "Credential"
},
{
"Definition": "A trusted entity that issues or registers subscriber authenticators and issues electronic credentials to subscribers. A CSP may be an independent third party or issue credentials for its own use.",
"Abbreviations": ["CSP"],
"Name": "Credential Service Provider"
},
{
"Definition": "An attack in which a subscriber currently authenticated to an RP and connected through a secure session browses to an attacker's website, causing the subscriber to unknowingly invoke unwanted actions at the RP. For example, if a bank website is vulnerable to a CSRF attack, it may be possible for a subscriber to unintentionally authorize a large money transfer, merely by viewing a malicious link in a webmail message while a connection to the bank is open in another browser window.",
"Abbreviations": ["CSRF"],
"Name": "Cross-site Request Forgery"
},
{
"Definition": "A vulnerability that allows attackers to inject malicious code into an otherwise benign website. These scripts acquire the permissions of scripts generated by the target website and can therefore compromise the confidentiality and integrity of data transfers between the website and client. Websites are vulnerable if they display user-supplied data from requests or forms without sanitizing the data so that it is not executable.",
"Abbreviations": ["XSS"],
"Name": "Cross-site Scripting"
},
{
"Definition": "An authenticator where the secret is a cryptographic key.",
"Name": "Cryptographic Authenticator"
},
{
"Definition": "A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. For the purposes of these guidelines, key requirements shall meet the minimum requirements stated in Table 2 of NIST SP 800-57 Part 1. See also asymmetric keys<\/em>, symmetric key<\/em>.",
"Name": "Cryptographic Key"
},
{
"Definition": "A set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation).",
"Name": "Cryptographic Module"
},
{
"Definition": "The property that data has not been altered by an unauthorized entity.",
"Name": "Data Integrity"
},
{
"Definition": "A credential issued based on proof of possession and control of an authenticator associated with a previously issued credential, so as not to duplicate the identity proofing process.",
"Name": "Derived Credential"
},
{
"Definition": "The process of establishing confidence in user identities presented digitally to a system. In previous editions of SP 800-63, this was referred to as Electronic Authentication<\/em>.",
"Name": "Digital Authentication"
},
{
"Definition": "An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation, but not confidentiality protection.",
"Name": "Digital Signature"
},
{
"Definition": "In regards to KBV, a multiple-choice question for which all answers provided are incorrect, requiring the applicant to select an option similar to \"none of the above.\"",
"Name": "Diversionary"
},
{
"Definition": "An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant.",
"Name": "Eavesdropping Attack"
},
{
"Definition": "See digital authentication<\/em>.",
"Abbreviations": ["E-Authentication"],
"Name": "Electronic Authentication"
},
{
"Definition": "The process through which an applicant applies to become a subscriber of a CSP and the CSP validates the applicant's identity.",
"Name": "Enrollment"
},
{
"Definition": "A measure of the amount of uncertainty an attacker faces to determine the value of a secret. Entropy is usually stated in bits. A value having n<\/em> bits of entropy has the same degree of uncertainty as a uniformly distributed n<\/em>-bit random value.",
"Name": "Entropy"
},
{
"Definition": "Under the Information Technology Management Reform Act (Public Law 104-106), the Secretary of Commerce approves the standards and guidelines that the National Institute of Standards and Technology (NIST) develops for federal computer systems. NIST issues these standards and guidelines as Federal Information Processing Standards (FIPS) for government-wide use. NIST develops FIPS when there are compelling federal government requirements, such as for security and interoperability, and there are no acceptable industry standards or solutions.",
"Abbreviations": ["FIPS"],
"Name": "Federal Information Processing Standard"
},
{
"Definition": "A process that allows the conveyance of identity and authentication information across a set of networked systems.",
"Name": "Federation"
},
{
"Definition": "A category describing the assertion protocol used by the federation to communicate authentication and attribute information (if applicable) to an RP.",
"Abbreviations": ["FAL"],
"Name": "Federation Assurance Level"
},
{
"Definition": "A component that acts as a logical RP to a set of IdPs and a logical IdP to a set of RPs, bridging the two systems with a single component. These are sometimes referred to as \"brokers\".",
"Name": "Federation Proxy"
},
{
"Definition": "Communication between two systems that relies on redirects through an intermediary such as a browser. This is normally accomplished by appending HTTP query parameters to URLs hosted by the receiver of the message.",
"Name": "Front-Channel Communication"
},
{
"Definition": "A function that maps a bit string of arbitrary length to a fixed-length bit string. Approved hash functions satisfy the following properties: (1) One-way - It is computationally infeasible to find any input that maps to any pre-specified output; and (2) Collision resistant - It is computationally infeasible to find any two distinct inputs that map to the same output.",
"Name": "Hash Function"
},
{
"Definition": "An attribute or set of attributes that uniquely describe a subject within a given context.",
"Name": "Identity"
},
{
"Definition": "A category that conveys the degree of confidence that the applicant's claimed identity is their real identity.",
"Abbreviations": ["IAL"],
"Name": "Identity Assurance Level"
},
{
"Definition": "Information or documentation provided by the applicant to support the claimed identity. Identity evidence may be physical (e.g. a driver license) or digital (e.g. an assertion generated and issued by a CSP based on the applicant successfully authenticating to the CSP).",
"Name": "Identity Evidence"
},
{
"Definition": "The process by which a CSP collects, validates, and verifies information about a person.",
"Name": "Identity Proofing"
},
{
"Definition": "The party that manages the subscriber's primary authentication credentials and issues assertions derived from those credentials. This is commonly the CSP as discussed within this document suite.",
"Abbreviations": ["IdP"],
"Name": "Identity Provider"
},
{
"Definition": "An authority responsible for the generation of data, digital evidence (such as assertions), or physical documents that can be used as identity evidence.",
"Name": "Issuing Source"
},
{
"Definition": "A widely used authentication protocol developed at MIT. In \"classic\" Kerberos, users share a secret password with a Key Distribution Center (KDC). The user (Alice) who wishes to communicate with another user (Bob) authenticates to the KDC and the KDC furnishes a \"ticket\" to use to authenticate with Bob.",
"Name": "Kerberos"
},
{
"Definition": "Identity verification method based on knowledge of private information associated with the claimed identity. This is often referred to as knowledge-based authentication (KBA) or knowledge-based proofing (KBP).",
"Abbreviations": ["KBV"],
"Name": "Knowledge-Based Verification"
},
{
"Definition": "An attack in which an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them. In the context of authentication, the attacker would be positioned between claimant and verifier, between registrant and CSP during enrollment, or between subscriber and CSP during authenticator binding.",
"Abbreviations": [
"MitM",
"MitMA"
],
"Name": "Man-in-the-Middle Attack"
},
{
"Definition": "A type of authenticator comprised of a character string intended to be memorized or memorable by the subscriber, permitting the subscriber to demonstrate something they know<\/em> as part of an authentication process.",
"Name": "Memorized Secret"
},
{
"Definition": "A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data. MACs provide authenticity and integrity protection, but not non-repudiation protection.",
"Abbreviations": ["MAC"],
"Name": "Message Authentication Code"
},
{
"Definition": "Executable code that is normally transferred from its source to another computer system for execution. This transfer is often through the network (e.g., JavaScript embedded in a web page) but may transfer through physical media as well.",
"Name": "Mobile Code"
},
{
"Definition": "A characteristic of an authentication system or an authenticator that requires more than one distinct authentication factor<\/em> for successful authentication. MFA can be performed using a single authenticator that provides more than one factor or by a combination of authenticators that provide different factors. The three authentication factors are something you know, something you have, and something you are.",
"Name": "Multi-Factor"
},
{
"Definition": "An authentication system that requires more than one distinct authentication factor<\/em> for successful authentication. Multi-factor authentication can be performed using a multi-factor authenticator or by a combination of authenticators that provide different factors. The three authentication factors are something you know<\/em>, something you have<\/em>, and something you are<\/em>.",
"Abbreviations": ["MFA"],
"Name": "Multi-Factor Authentication"
},
{
"Definition": "An authenticator that provides more than one distinct authentication factor, such as a cryptographic authentication device with an integrated biometric sensor that is required to activate the device.",
"Name": "Multi-Factor Authenticator"
},
{
"Definition": "An open communications medium, typically the Internet, used to transport messages between the claimant and other parties. Unless otherwise stated, no assumptions are made about the network's security; it is assumed to be open and subject to active (e.g., impersonation, man-in-the-middle, session hijacking) and passive (e.g., eavesdropping) attack at any point between the parties (e.g., claimant, verifier, CSP, RP).",
"Name": "Network"
},
{
"Definition": "A value used in security protocols that is never repeated with the same key. For example, nonces used as challenges in challenge-response authentication protocols SHALL not be repeated until authentication keys are changed. Otherwise, there is a possibility of a replay attack. Using a nonce as a challenge is a different requirement than a random challenge, because a nonce is not necessarily unpredictable.",
"Name": "Nonce"
},
{
"Definition": "An attack where the attacker obtains some data (typically by eavesdropping on an authentication protocol run or by penetrating a system and stealing security files) that he/she is able to analyze in a system of his/her own choosing.",
"Name": "Offline Attack"
},
{
"Definition": "An attack against an authentication protocol where the attacker either assumes the role of a claimant with a genuine verifier or actively alters the authentication channel.",
"Name": "Online Attack"
},
{
"Definition": "An attack in which an attacker performs repeated logon trials by guessing possible values of the authenticator output.",
"Name": "Online Guessing Attack"
},
{
"Definition": "An opaque unguessable subscriber identifier generated by a CSP for use at a specific individual RP. This identifier is only known to and only used by one CSP-RP pair.",
"Name": "Pairwise Pseudonymous Identifier"
},
{
"Definition": "An attack against an authentication protocol where the attacker intercepts data traveling along the network between the claimant and verifier, but does not alter the data (i.e., eavesdropping).",
"Name": "Passive Attack"
},
{
"Definition": "A passphrase is a memorized secret consisting of a sequence of words or other text that a claimant uses to authenticate their identity. A passphrase is similar to a password in usage, but is generally longer for added security.",
"Name": "Passphrase"
},
{
"Definition": "See memorized secret<\/em>.",
"Name": "Password"
},
{
"Definition": "See personally identifiable information<\/em>.",
"Name": "Personal Data"
},
{
"Definition": "A memorized secret typically consisting of only decimal digits.",
"Abbreviations": ["PIN"],
"Name": "Personal Identification Number"
},
{
"Definition": "See personally identifiable information<\/em>.",
"Name": "Personal Information"
},
{
"Definition": "As defined by OMB Circular A-130, Personally Identifiable Information is information that can be used to distinguish or trace an individual's identity, either alone or when combined with other information that is linked or linkable to a specific individual.",
"Abbreviations": ["PII"],
"Name": "Personally Identifiable Information"
},
{
"Definition": "An attack in which an attacker corrupts an infrastructure service such as DNS (Domain Name System) causing the subscriber to be misdirected to a forged verifier/RP, which could cause the subscriber to reveal sensitive information, download harmful software, or contribute to a fraudulent act.",
"Name": "Pharming"
},
{
"Definition": "An attack in which the subscriber is lured (usually through an email) to interact with a counterfeit verifier/RP and tricked into revealing information that can be used to masquerade as that subscriber to the real verifier/RP.",
"Name": "Phishing"
},
{
"Definition": "The ability to activate and use the authenticator in an authentication protocol.",
"Name": "Possession and Control of an Authenticator"
},
{
"Definition": "A formal statement of the practices followed by the parties to an authentication process (e.g., CSP or verifier). It usually describes the parties' policies and practices and can become legally binding.",
"Name": "Practice Statement"
},
{
"Definition": "Presentation to the biometric data capture subsystem with the goal of interfering with the operation of the biometric system.",
"Name": "Presentation Attack"
},
{
"Definition": "Automated determination of a presentation attack. A subset of presentation attack determination methods, referred to as liveness detection<\/em>, involve measurement and analysis of anatomical characteristics or involuntary or voluntary reactions, in order to determine if a biometric sample is being captured from a living subject present at the point of capture.",
"Abbreviations": ["PAD"],
"Name": "Presentation Attack Detection"
},
{
"Definition": "Credentials that cannot be disclosed by the CSP because the contents can be used to compromise the authenticator.",
"Name": "Private Credentials"
},
{
"Definition": "The secret part of an asymmetric key pair that is used to digitally sign or decrypt data.",
"Name": "Private Key"
},
{
"Definition": "A session wherein messages between two participants are encrypted and integrity is protected using a set of shared secrets called session keys. A participant is said to be authenticated<\/em> if, during the session, they prove possession of one or more authenticators in addition to the session keys, and if the other party can verify the identity associated with the authenticator(s). If both participants are authenticated, the protected session is said to be mutually authenticated<\/em>.",
"Name": "Protected Session"
},
{
"Definition": "A name other than a legal name.",
"Name": "Pseudonym"
},
{
"Definition": "The use of a pseudonym to identify a subject.",
"Name": "Pseudonymity"
},
{
"Definition": "A meaningless but unique number that does not allow the RP to infer anything regarding the subscriber but which does permit the RP to associate multiple interactions with the subscriber's claimed identity.",
"Name": "Pseudonymous Identifier"
},
{
"Definition": "Credentials that describe the binding in a way that does not compromise the authenticator.",
"Name": "Public Credentials"
},
{
"Definition": "The public part of an asymmetric key pair that is used to verify signatures or encrypt data.",
"Name": "Public Key"
},
{
"Definition": "A digital document issued and digitally signed by the private key of a certificate authority that binds an identifier to a subscriber to a public key. The certificate indicates that the subscriber identified in the certificate has sole control and access to the private key.",
"Name": "Public Key Certificate"
},
{
"Definition": "A set of policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.",
"Abbreviations": ["PKI"],
"Name": "Public Key Infrastructure"
},
{
"Definition": "The process of confirming the subscriber's continued presence and intent to be authenticated during an extended usage session.",
"Name": "Reauthentication"
},
{
"Definition": "See enrollment<\/em>.",
"Name": "Registration"
},
{
"Definition": "An entity that relies upon the subscriber's authenticator(s) and credentials or a verifier's assertion of a claimant's identity, typically to process a transaction or grant access to information or a system.",
"Abbreviations": ["RP"],
"Name": "Relying Party"
},
{
"Definition": "(In the context of remote authentication or remote transaction<\/em>) An information exchange between network-connected devices where the information cannot be reliably protected end-to-end by a single organization's security controls.",
"Name": "Remote"
},
{
"Definition": "An attack in which the attacker is able to replay previously captured messages (between a legitimate claimant and a verifier) to masquerade as that claimant to the verifier or vice versa.",
"Name": "Replay Attack"
},
{
"Definition": "The property of an authentication process to resist replay attacks, typically by use of an authenticator output that is valid only for a specific authentication.",
"Name": "Replay Resistance"
},
{
"Definition": "An authenticator type, class, or instantiation having additional risk of false acceptance associated with its use that is therefore subject to additional requirements.",
"Name": "Restricted"
},
{
"Definition": "The process of identifying, estimating, and prioritizing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, and other organizations, resulting from the operation of a system. It is part of risk management, incorporates threat and vulnerability analyses, and considers mitigations provided by security controls planned or in place. Synonymous with risk analysis.",
"Name": "Risk Assessment"
},
{
"Definition": "The program and supporting processes to manage information security risk to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and includes: (i) establishing the context for risk-related activities; (ii) assessing risk; (iii) responding to risk once determined; and (iv) monitoring risk over time.",
"Name": "Risk Management"
},
{
"Definition": "A non-secret value used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker.",
"Name": "Salt"
},
{
"Definition": "See Transport Layer Security (TLS)<\/em>.",
"Abbreviations": ["SSL"],
"Name": "Secure Sockets Layer"
},
{
"Definition": "A persistent interaction between a subscriber and an endpoint, either an RP or a CSP. A session begins with an authentication event and ends with a session termination event. A session is bound by use of a session secret that the subscriber's software (a browser, application, or OS) can present to the RP or CSP in lieu of the subscriber's authentication credentials.",
"Name": "Session"
},
{
"Definition": "An attack in which the attacker is able to insert himself or herself between a claimant and a verifier subsequent to a successful authentication exchange between the latter two parties. The attacker is able to pose as a subscriber to the verifier or vice versa to control session data exchange. Sessions between the claimant and the RP can be similarly compromised.",
"Name": "Session Hijack Attack"
},
{
"Definition": "A secret used in authentication that is known to the subscriber and the verifier.",
"Name": "Shared Secret"
},
{
"Definition": "An attack enabled by leakage of information from a physical cryptosystem. Characteristics that could be exploited in a side-channel attack include timing, power consumption, and electromagnetic and acoustic emissions.",
"Name": "Side-Channel Attack"
},
{
"Definition": "A characteristic of an authentication system or an authenticator that requires only one authentication factor (something you know, something you have, or something you are) for successful authentication.",
"Name": "Single-Factor"
},
{
"Definition": "The act of deceiving an individual into revealing sensitive information, obtaining unauthorized access, or committing fraud by associating with the individual to gain confidence and trust.",
"Name": "Social Engineering"
},
{
"Definition": "A type of publication issued by NIST. Specifically, the SP 800-series reports on the Information Technology Laboratory's research, guidelines, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations.",
"Abbreviations": ["SP"],
"Name": "Special Publication"
},
{
"Definition": "A person, organization, device, hardware, network, software, or service.",
"Name": "Subject"
},
{
"Definition": "A party who has received a credential or authenticator from a CSP.",
"Name": "Subscriber"
},
{
"Definition": "A cryptographic key used to perform both the cryptographic operation and its inverse. For example, to encrypt and decrypt or create a message authentication code and to verify the code.",
"Name": "Symmetric Key"
},
{
"Definition": "See authenticator<\/em>.",
"Name": "Token"
},
{
"Definition": "See authenticator output<\/em>.",
"Name": "Token Authenticator"
},
{
"Definition": "See authenticator secret<\/em>.",
"Name": "Token Secret"
},
{
"Definition": "A discrete event between a user and a system that supports a business or programmatic purpose. A government digital system may have multiple categories or types of transactions, which may require separate analysis within the overall digital identity risk assessment.",
"Name": "Transaction"
},
{
"Definition": "An authentication and security protocol widely implemented in browsers and web servers. TLS is defined by RFC 5246. TLS is similar to the older SSL protocol, and TLS 1.0 is effectively SSL version 3.1. NIST SP 800-52, Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations, specifies how TLS is to be used in government applications.",
"Abbreviations": ["TLS"],
"Name": "Transport Layer Security"
},
{
"Definition": "A public or symmetric key that is trusted because it is directly built into hardware or software, or securely provisioned via out-of-band means, rather than because it is vouched for by another trusted entity (e.g. in a public key certificate). A trust anchor may have name or policy constraints limiting its scope.",
"Name": "Trust Anchor"
},
{
"Definition": "Per ISO/IEC 9241-11: Extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction in a specified context of use.",
"Name": "Usability"
},
{
"Definition": "An entity that verifies the claimant's identity by verifying the claimant's possession and control of one or two authenticators using an authentication protocol. To do this, the verifier may also need to validate credentials that link the authenticator(s) to the subscriber's identifier and check their status.",
"Name": "Verifier"
},
{
"Definition": "A scenario where the attacker impersonates the verifier in an authentication protocol, usually to capture information that can be used to masquerade as a subscriber to the real verifier. In previous editions of SP 800-63, authentication protocols that are resistant to verifier impersonation have been described as \"strongly MitM resistant\".",
"Name": "Verifier Impersonation"
},
{
"Definition": "A remote identity proofing process that employs physical, technical and procedural measures that provide sufficient confidence that the remote session can be considered equivalent to a physical, in-person identity proofing process.",
"Name": "Virtual In-Person Proofing"
},
{
"Definition": "Credentials that are bound to a subscriber in a manner than can be modified without invalidating the credential.",
"Name": "Weakly Bound Credentials"
},
{
"Definition": "A password-based authentication protocol that allows a claimant to authenticate to a verifier without revealing the password to the verifier. Examples of such protocols are EKE, SPEKE and SRP.",
"Name": "Zero-Knowledge Password Protocol"
},
{
"Definition": "Overwrite a memory location with data consisting entirely of bits with the value zero so that the data is destroyed and not recoverable. This is often contrasted with deletion methods that merely destroy reference to data within a file system rather than the data itself.",
"Name": "Zeroize"
}
],
"$Type": "TrustmarkDefinition",
"Sources": [{
"Identifier": "NIST SP 800-63B",
"Reference": "NIST Special Publication 800-63B, Digital Identity Guidelines: Authentication and Lifecycle Management. June 2017. https://doi.org/10.6028/NIST.SP.800-63b.",
"$id": "source-1395928943"
}]
}