Determining Authentication Strength for Smart Card-based Authentication Use Cases
نویسنده
چکیده
Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authentication use cases are being deployed. Assignment of authentication strength for each of the use cases is often based on: (a) the total number of three common orthogonal authentication factors – What You Know, What You Have and What You are – used in the particular use case and (b) the entropy associated with each factor chosen. The objective of this paper is to analyze the limitation of this approach and present a new methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications – the card (token), the token secret, the card holder, the card issuer and the person identifier stored in the card The use of the methodology for developing an authentication assurance level taxonomy for a real world smart identity token deployment is also illustrated.
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملA smart card based remote user authentication scheme
Password based authentication schemes are commonly used to authenticate remote users. Many schemes have been proposed both with and without smart cards but each have its own merits and demerits. This paper analyzes the security of an enhanced Dynamic ID based remote user authentication scheme and shows that the enhanced scheme has major security weaknesses. The paper also presents a new scheme ...
متن کاملPassword Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks
We study the security requirements for remote authentication with password protected smart card. In recent years, several protocols for password-based authenticated key exchange have been proposed. These protocols are used for the protection of password based authentication between a client and a remote server. In this paper, we will focus on the password based authentication between a smart ca...
متن کاملComments on Five Smart Card Based Password Authentication Protocols
In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.¡s , Hsiang et al.¡s, Kim et al.¡s, and Li et al.¡s all suffer from offline password guessing attack if the smart card is lost, and the protocol of Xu et al.¡s is subjected ...
متن کاملA Simple Password Authentication Scheme Based on Geometric Hashing Function
Password authentication protocol is one of most important mechanisms to prevent resources from accessing by unauthorized users. Many password authentication schemes have been developed in last decades, and many of them are based on the use of smart card. However, nowadays it is not applicable for many applications on the Internet to adopt the smart card in their authentication scheme due to its...
متن کامل