Authentication method with impersonal token cards
نویسندگان
چکیده
Traditional methods of user authentication in distributed systems suuer from an important weakness which is due to the low degree of randomness in secrets that human beings can use for identiication. Even though weak secrets (passwords and PINs) are typically not exposed in the clear over the communication lines, they can be discovered with oo-line brute force attacks based on exhaustive trials. Since such secrets are chosen from a relatively small key space, a determined adversary can try all possible values until a match is found between the trial value and the message recorded from a genuine authentication session. Authen-tication devices like smartcards and token cards ooer an attractive solution by providing a user with a cryptographically strong key for authentication. In contrast to passwords and PINs, the device's key can be chosen from a much larger key space thus making a brute force attack computationally infeasible or, at least, diicult. In this paper we present a novel authentication method whereby the authentication device (a token card) is used solely to provide a secure channel between a human user and an authentication server (AS). Since the communication channel is secured by the card, the user can still utilize weak secrets for authentication purposes, but, without any risk of exposure. Furthermore, the card's and the user's secrets are mutually independent, i.e., the card is not associated with any particular user. Since the card is impersonal, it can be freely shared by several users. This eliminates the high cost of administration which is typical of existing designs requiring xed user-device relationship. Moreover, our method does not require any coupling between the token card and the workstation (e.g., a gal-vanic connection) which would be diicult to implement on a global scale and retroot onto existing equipment.
منابع مشابه
Determining Authentication Strength for Smart Card-based Authentication Use Cases
Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authentication use cases are being deployed. Assignment of authentication strength for each of the use cases i...
متن کاملAuthentication Using Mobile Phone as a Security Token
Today security concerns are on the rise in all areas industries such as banks, governmental applications, healthcare industry, militaryorganization, educational institutions etc, with one common weak link being “passwords”. Several proper strategies for using passwords have been proposed. Some of which are very difficult to use and others might not meet the company’s security concerns. The usag...
متن کاملIntegrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication
Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this pape...
متن کاملA Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
We propose a simple cast-as-intended remote e-voting protocol where the security is based on the use of secure (and trusted) smart cards that incorporate incard numeric keyboards and LCD displays, and can perform a limited number of cryptographic operations (like encryption, signing, and random number generation). The protocol, while very simple, is significantly more secure (in the sense of “c...
متن کاملAuthentication Approaches for E-Commerce Transactions:
Mostly we use password for Remote Authentication but Smart Cardbased scheme is very promising and practical solution to remote authentication. Over the past several years, Smart Cards have achieved a growing acceptance as a powerful tool for Security, Identification and Authorization. Smart Cards have been widely used as simple token hardware in authentication process. As the e-business is grow...
متن کامل