DocumentCode :
680150
Title :
No security by obscurity - why two factor authentication should be based on an open design
Author :
Yu, Jinying ; Brune, Philipp
Author_Institution :
Hochschule Neu-Ulm - University of Applied Sciences, Wileystraße 1, D-89231, Germany
fYear :
2011
fDate :
18-21 July 2011
Firstpage :
418
Lastpage :
421
Abstract :
The recently reported security issue possibly compromising the security tokens sold by a major vendor of two factor authentication (2FA) solutions (Schneier, 2011) demonstrates the importance of the basic principle of using an open design for security solutions (Saltzer and Schroeder, 1974). In particular, the safety of such devices should not be based on the use of a secret algorithm or seed value to generate a sequence of one-time passwords (OTP) inside the security token. Instead, we argue in favour of using an open design using pre-generated sequences of OTP that are stored encrypted on the security token. Here, the safety of the solution only relies on the confidentiality of the decryption key and not the design of the solution itself. We illustrate our argumentation by describing a respective authentication scheme and a prototype based on an open design, the latter being used as the basis for the security analysis.
Keywords :
Algorithm design and analysis; Authentication; Cryptography; Servers; Smart cards; Software; IT-Security; Identity Management; Smart Cards; Two Factor Authentication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on
Conference_Location :
Seville, Spain
Type :
conf
Filename :
6732426
Link To Document :
بازگشت