hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers

نویسندگان

  • Shujun Li
  • Ahmad-Reza Sadeghi
  • Roland Schmitz
چکیده

We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user’s computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor computationally expensive encryption module. Due to the rapid progress of the Internet, e-banking has become more and more popular all over the world and security is considered as one of the most serious issues of e-banking. The earliest and simplest defense protecting e-banking systems is user authentication based on static PINs. Since static PINs are prone to identity theft, two-factor user authentication such as PIN/TAN has been widely adopted to make e-banking more secure. However, PIN/TAN cannot resist man-in-the-middle (MitM) attack, whose aim is to manipulate transactions. In the strongest form of MitM attacks, the user’s computer is under the full control of the adversary, who can observe and tamper with all the communications between the user and the e-banking server. The wide spread of malware over the Internet renders such advanced MitM attacks possible in reality. In this poster, we propose hPIN/hTAN, the first (to the best of our knowledge) hardware-based solution against MitC attacks that depends on neither second trusted channel nor secure keyboard nor computationally expensive encryption (such as PKC). Instead, hPIN/hTAN bases its security only on proper use of a cryptographic hash function and active involvement of human attention. The hPIN/hTAN includes two specific protocols – hPIN and hTAN, which protect the login process and online transactions, respectively. The involved parties include a human user, a trusted USB-token issued by the bank to the user, an untrusted terminal computer, and the e-banking server. The USB-token is equipped with a trusted display and shares a secret with the server. The core of the hPIN protocol is a random code shown on the trusted display of the USB-token, which makes it possible for the user to input a transformed PIN on the untrusted computer without leaking the PIN. After the user authenticates herself to the USB-token, the hPIN protocol continues to achieve mutual authentication between the USB-token and the server. In the hTAN protocol, the user verifies the transaction data simultaneously while typing them on the keyboard of the untrusted computer. Then the USB-token and the server perform a transaction verification process based on the shared secret.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers

In this paper, we propose hPIN/hTAN, a low-cost hardware token based PIN/TAN system for protecting e-banking systems against the strong threat model where the adversary has full control over the user’s computer. This threat model covers various kinds of attacks related to untrusted terminal computers, such as keyloggers, screen scrapers, session hijackers, Trojan horses and transaction generato...

متن کامل

Neue Entwicklungen in der e-Banking Security

Wir zeigen, dass die in heutigen e-Banking Systemen eingesetzten CAPTCHAs unsicher sind, d.h. von einem Programm ausreichend schnell gelöst werden können, um praktische Attacken zu ermöglichen. Auch die von den Banken in letzter Zeit häufig propagierte Lösung mTAN (mTAN) ist aus unserer Sicht problematisch. Wir plädieren deshalb für den Einsatz kostengünstiger, Hardware-basierter Token, die tra...

متن کامل

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems

Current PCand web-based applications provide insufficient security for the information they access, because vulnerabilities anywhere in a large client software stack can compromise confidentiality and integrity. We propose a new architecture for secure applications, Cloud Terminal, in which the only software running on the end host is a lightweight secure thin terminal, and most application log...

متن کامل

A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain

Banking as an essential service can be hard to access in remote, rural regions where the network connectivity is intermittent. Although micro-banking has been made possible by SMS or USSD messages in some places, their security flaws and session-based nature prevent them from a wider adoption. Global level cryptocurrencies enable low-cost, secure and pervasive money transferring among distribut...

متن کامل

One-Time Biometrics for Online Banking and Electronic Payment Authentication

Online banking and electronic payment systems on the Internet are becoming increasingly advanced. On the machine level, transactions take place between client and server hosts through a secure channel protected with SSL/TLS. User authentication is typically based on two or more factors. Nevertheless, the development of various malwares and social engineering attacks transform the user’s PC in a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010