Controversy: Rejoinder: Independent One-Time Passwords
نویسنده
چکیده
Security Dynamics In order for Computing Systems to remain a "Quarterly dedicated to the analysis and understanding of advanced computing systems," it is necessary to make the following clarification regarding an article in the V/inter 1996 issue (Volume 9, Number 1). The article in question was entitled "Independent One-Time Passwords," and authored by Aviel D. Rubin of Bellcore. In this article, Rubin compares two dissimilar technologies used to create one-time passwords. One product, which comes from Rubin's own Bellcore, is the S/KEY software authentication system. The other product is the SecurID token from Security Dynamics. Rubin is misleading when he states that "One way to defeat it [SecurID] is to break the secret algorithm to predict the next number that will be displayed" lp. 171. This makes it sound as if simply knowing the algorithm and observing a few displayed numbers allows an attacker to predict the next number. This is not the case; predicting the sequence of numbers for a given token requires knowledge of both the algorithm and the token's unique, 64-bit, seed number, which is contained in protected storage on the token. Attacking the SecurID algorithm without knowledge of the secret seed value seems implausible. The algorithm has been analyzed by several noted cryptana-lysts and they have discovered no such attack. They also estimate that such an attack, if possible, would require observation of a sequence of many thousands, if not millions, of displayed numbers. Given that the typical token only displays one number per minute, no attacker will plausibly have access to such a Large sequence.
منابع مشابه
لبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملThe Statistical Significance Controversy Is Definitely Not Over: A Rejoinder to Responses by Thompson, Knapp, and Levin
A rejoinder is offered on the three reviews of Daniel’s article (this issue) by Thompson, Knapp, and Levin. It is concluded that the controversy over statistical significance testing will no doubt continue. Nevertheless, the gradual movement of the field toward requiring additional information in the reporting of statistical results is viewed as evidence of a positive response to long-term crit...
متن کاملAdvancing scientific discourse in the controversy surrounding the Comprehensive System for the Rorschach: a rejoinder to Meyer (2000).
A recent commentary by Meyer (2000) in the Journal of Personality Assessment alleged that Rorschach critic Wood and his colleagues had intentionally published information that they knew to be in error. To substantiate this contention, Meyer's commentary published information that was part of the peer review process at another journal. In this rejoinder, we present factual information that shows...
متن کاملA simple scheme to make passwords based on one-way functions much harder to crack
We present a simple scheme that makes guessing passwords based on one-way functions 100 to 1000 times harder. The scheme is easy to program and easy to incrementally add to existing schemes. In particular, there is no need to switch to it all at the same time. Old passwords will still work and have the same security as before (one will not be able to distinguish them from new passwords); newly-...
متن کاملIndependent One-Time Passwords
Existing one-time password (OTP) schemes suffer several drawbacks. Token-based systems are expensive, while software-based schemes rely on one-time passwords that are dependent on each other.-There are disadvantages to authentication schemes that rely on dependent OTPs. It is difficult to replicate the authentication server without lowering security. Also, current authentication schemes based o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computing Systems
دوره 9 شماره
صفحات -
تاریخ انتشار 1996