DocumentCode
680150
Title
No security by obscurity - why two factor authentication should be based on an open design
Author
Yu, Jinying ; Brune, Philipp
Author_Institution
Hochschule Neu-Ulm - University of Applied Sciences, Wileystraße 1, D-89231, Germany
fYear
2011
fDate
18-21 July 2011
Firstpage
418
Lastpage
421
Abstract
The recently reported security issue possibly compromising the security tokens sold by a major vendor of two factor authentication (2FA) solutions (Schneier, 2011) demonstrates the importance of the basic principle of using an open design for security solutions (Saltzer and Schroeder, 1974). In particular, the safety of such devices should not be based on the use of a secret algorithm or seed value to generate a sequence of one-time passwords (OTP) inside the security token. Instead, we argue in favour of using an open design using pre-generated sequences of OTP that are stored encrypted on the security token. Here, the safety of the solution only relies on the confidentiality of the decryption key and not the design of the solution itself. We illustrate our argumentation by describing a respective authentication scheme and a prototype based on an open design, the latter being used as the basis for the security analysis.
Keywords
Algorithm design and analysis; Authentication; Cryptography; Servers; Smart cards; Software; IT-Security; Identity Management; Smart Cards; Two Factor Authentication;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on
Conference_Location
Seville, Spain
Type
conf
Filename
6732426
Link To Document