• DocumentCode
    680150
  • Title

    No security by obscurity - why two factor authentication should be based on an open design

  • Author

    Yu, Jinying ; Brune, Philipp

  • Author_Institution
    Hochschule Neu-Ulm - University of Applied Sciences, Wileystraße 1, D-89231, Germany
  • fYear
    2011
  • fDate
    18-21 July 2011
  • Firstpage
    418
  • Lastpage
    421
  • Abstract
    The recently reported security issue possibly compromising the security tokens sold by a major vendor of two factor authentication (2FA) solutions (Schneier, 2011) demonstrates the importance of the basic principle of using an open design for security solutions (Saltzer and Schroeder, 1974). In particular, the safety of such devices should not be based on the use of a secret algorithm or seed value to generate a sequence of one-time passwords (OTP) inside the security token. Instead, we argue in favour of using an open design using pre-generated sequences of OTP that are stored encrypted on the security token. Here, the safety of the solution only relies on the confidentiality of the decryption key and not the design of the solution itself. We illustrate our argumentation by describing a respective authentication scheme and a prototype based on an open design, the latter being used as the basis for the security analysis.
  • Keywords
    Algorithm design and analysis; Authentication; Cryptography; Servers; Smart cards; Software; IT-Security; Identity Management; Smart Cards; Two Factor Authentication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on
  • Conference_Location
    Seville, Spain
  • Type

    conf

  • Filename
    6732426