The End of the Password Age

Share this article

Despite revolutionary advances in computing, we still rely on a string of characters to authenticate users. Passwords originated hundreds of years ago and were certainly used by Roman military. In the modern era, MIT’s CTSS introduced passwords in 1961. Unfortunately, password problems are prevalent:

  • People are predictable. Thousands use popular codes such as ‘password’, ‘123456’, ‘qwerty’, and ‘salmonmousse’ for their credentials.
  • The stronger your password, the more difficult it is to remember.
  • The more passwords you have, the more you need to write down on post-it notes stuck to your monitor.

The web exacerbates the issues. We’re now expected to remember dozens of passwords for public systems which are open to crackers, the NSA, or anyone who wants to deface your Facebook page.

Finally, increases in computing power allow nefarious developers to use brute-force entry by testing millions of character combinations. As we progress toward quantum computing, systems will be able to correctly guess every password you’ll ever use before you’ve thought of one.

Biometric Security

Basic biometric security such as finger-print, retina, and crotch odor analysis have been available for many years. The hardware is expensive, unreliable, and can easily be circumvented. Hollywood movies highlight flaws such as using an unconscious guard, obtaining prints from a glass, or removing body organs prior to authentication.

small prickFortunately, a new era of biometric security has been proposed by Dr Hans Hertz from the University of Dumiydia in Uzbekistan. The method verifies the unique structure of deoxyribonucleic acid — your DNA:

  1. Your DNA sequence is lodged with the Central Ribonucleic Analysis Portal.
  2. A Biometric Analysis Device is attached to your computer. This extracts a small vial of blood — you’ll feel a prick whenever you access certain websites. Other factors such as pulse, warmth, blood pressure, etc. are also measured to ensure the device has direct access to your body.
  3. Your computer analyzes the DNA, verifies a number of gene sequences against the portal, and permits or denies access.

The process currently takes several days, but this should reduce to a few hours as the technology improves.

Biological Benefits

your daily healthBiometric analysis is not limited to authentication. The software can act as a virtual doctor making early health diagnosis and medication recommendations. In extreme circumstances, your local health agency can be alerted to imminent problems.

Dr Hertz claims further advantages:
“We discovered my wife’s great-grandmother probably had ginger hair. I offered her therapy to correct the defective gene, although we’ve recently separated.”

Social Submissions

The top social networks have all expressed interest in the system. With access to DNA records, additional processing can establish genealogical relationships — perhaps to identify long-lost family members or famous ancestors.

Dr Hertz continues:
“This is an exciting use of the technology. Imagine logging on to Facebook to be informed your father isn’t who you think he is, or you’re about to marry your sister. The possibilities are literally limitless.”

The age of the password has finally come to an end.

Craig BucklerCraig Buckler
View Author

Craig is a freelance UK web consultant who built his first page for IE2.0 in 1995. Since that time he's been advocating standards, accessibility, and best-practice HTML5 techniques. He's created enterprise specifications, websites and online applications for companies and organisations including the UK Parliament, the European Parliament, the Department of Energy & Climate Change, Microsoft, and more. He's written more than 1,000 articles for SitePoint and you can find him @craigbuckler.

Share this article
Read Next
Get the freshest news and resources for developers, designers and digital creators in your inbox each week
Loading form