Improved Cryptanalysis of SecurID
نویسندگان
چکیده
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurID hash function [1]. They showed that vanishing differentials – collisions of the hash function – occur quite frequently, and that such differentials allow an attacker to recover the secret key in the token much faster than exhaustive search. Based on simulation results, they estimated that given a single 2-bit vanishing differential, the running time of their attack would be about 2 full hash operations. In this paper, we first give a more detailed analysis of the attack in [1] and present several techniques to improve it significantly. Our theoretical analysis and implementation experiments show that the running time of our improved attack is about 2 hash operations, though special cases involving ≥ 4-bit differentials (which happen about one third of the time) reduce the time further. We then investigate into the use of extra information that an attacker would typically have: multiple vanishing differentials or knowledge that other vanishing differentials do not occur in a nearby time period. When using the extra information, it appears that key recovery can always be accomplished within about 2 hash operations.
منابع مشابه
Cryptanalysis of the Alleged SecurID Hash Function
The SecurID hash function is used for authenticating users to a corporate computer infrastructure. We analyse an alleged implementation of this hash function. The block cipher at the heart of the function can be broken in few milliseconds on a PC with 70 adaptively chosen plaintexts. The 64-bit secret key of 10% of the cards can be discovered given two months of token outputs and 2 analysis ste...
متن کاملInitial Cryptanalysis of the RSA SecurID Algorithm
Recently, I.C. Wiener published a reverse engineering effort of the RSA SecurID algorithm [1]. There were few speculations on the security ramifications of the algorithm in I.C. Wiener’s posting, so this note is an effort to touch upon areas of concern. We have verified that I.C. Wiener’s released version of the proprietary algorithm is accurate by comparing it with our own prior reverse engine...
متن کاملInitial Cryptanalysis of the RSA SecurID Algorithm
Recently, I.C. Wiener published a reverse engineering effort of the RSA SecurID algorithm [1]. There were few speculations on the security ramifications of the algorithm in I.C. Wiener’s posting, so this note is an effort to touch upon areas of concern. We have verified that I.C. Wiener’s released version of the proprietary algorithm is accurate by comparing it with our own prior reverse engine...
متن کاملFast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurID hash function [1]. They showed that vanishing differentials – collisions of the hash function – occur quite frequently, and that such differentials allow an attacker to recover the secret key in the token much faste...
متن کاملResponse: Independent One-Time Passwords
It is understandable that Security Dynamics is sensitive to any article that is critical of their SecurID card. After all, their success is based on their cus-tomers' confidence that their one-time password scheme is unbreakable. Thus, it appears to me that they read my article in Computing Systems with an overþ-sensitive eye and misunderstood some of it. In this response, I will try to clarify...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2003 شماره
صفحات -
تاریخ انتشار 2003