one-time password

68
ONE-TIME PASSWORD By Ata Ebrahimi|www.AtaEbrahimi.com

Upload: ata-ebrahimi

Post on 15-Jul-2015

249 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: One-Time Password

ONE-TIME PASSWORD By Ata Ebrahimi|www.AtaEbrahimi.com

Page 2: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 3: One-Time Password

ABSTRACT

This presentation describes a one-time password authentication system

(OTP). The system provides authentication for system access (login) and

other applications requiring authentication that is secure against

passive attacks based on replying captured reusable password.

Page 4: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Security and Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 5: One-Time Password

NEED

As organizations migrate more Business-to-Business (B2B) and Business-

to-Consumer (B2C) interactions online, the need to protect identities and

enable secure remote access has become critical. Traditional “static”

passwords are easily stolen, frequently lost and expensive for the

enterprise to manage.

Page 6: One-Time Password

NEED

B2B B2C

Page 7: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 8: One-Time Password

OVERVIEW

One form of attack on networked computing system is eavesdropping on

network connections to obtain authentication information such as the login

IDs and passwords of users. Ones this information is captured, it can be

used at a later time to gain access to the system.

Page 9: One-Time Password

OVERVIEW

One–time password systems are designed to counter this type of attack.

Page 10: One-Time Password

OVERVIEW

A One-Time Password (OTP) is a means of more simply and securely

proving the identity of a user. In a common implementation model, the

end-user carries an authentication device (called a token) that could be a

standalone device, such as a card or a fob that can be hung on a key chain.

Page 11: One-Time Password

OVERVIEW

OTP Provides

Simple and Secure System Access

Page 12: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 13: One-Time Password

METHODS OF GENERATING

Time-synchronized Mathematical Algorithm

Page 14: One-Time Password

TIME SYNCHRONIZED

Usually related to a piece of hardware called a Security Token

Inside the token is an accurate clock that has been synchronized with the clock on the proprietary Authentication Server

Page 15: One-Time Password

TIME SYNCHRONIZED

New passwords is based on the current time

In addition with previous password or a secret key.

Page 16: One-Time Password

MATHEMATICAL ALGORITHM

Previous Password-Based

A chain and must be used in a predefined order and each new OTP may be created from the past OTPs used

Challenge-Response Based (Event-Based)

Will require a user to provide a response to a challenge, A random number chosen by authentication server and/or a counter

Page 17: One-Time Password

PREVIOUS PASSWORD-BASED

Works by starting with an initial seed s, then generating passwords f(s), f(f(s)), f(f(f(s))), ... As many times as necessary

If an indefinite series of passwords is wanted, a new seed value can be chosen after the set for s is exhausted

Page 18: One-Time Password

CHALLENGE RESPONSE-BASED (EVENT-BASED)

In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.

The simplest example of a challenge-response protocol is password authentication, where the challenge is asking for the password and the valid response is the correct password.

Page 19: One-Time Password

CHALLENGE RESPONSE-BASED (EVENT-BASED)

This can be done by inputting the value that the token has generated into the token itself

To avoid duplicates, an additional counter is usually involved, so if one happens to get the same challenge twice, this still results in different one-time passwords

The computation does not usually involve the previous one-time password.

Page 20: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 21: One-Time Password

TIME SYNCHRONIZED ALGORITHM

TOTP

Page 22: One-Time Password

HMAC-BASED ONE-TIME PASSWORD (HOTP) ALGORITHM

In cryptography, HMAC (Hash-based Message Authentication Code), is a specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key.

Page 23: One-Time Password

HMAC-BASED ONE-TIME PASSWORD (HOTP) ALGORITHM

Based on an increasing counter value and a static symmetric key known only to the token

Using HMAC-SHA-1 algorithm to create HOTP value

HOTP (K, C) = Truncate(HMAC-SHA-1 (K, C))

K = The Key, C = Counter

Page 24: One-Time Password

TIME-BASED ONE-TIME PASSWORD (TOTP) ALGORITHM

An extension of HMAC-based one-time password (HOTP) to support time-based moving factor

Page 25: One-Time Password

TIME-BASED ONE-TIME PASSWORD (TOTP) ALGORITHM

This variant of the HOTP algorithm specifies the calculation of a one-time password value, based on representation of counter as a time factor.

Page 26: One-Time Password

TIME-BASED ONE-TIME PASSWORD (TOTP) ALGORITHM

TOTP = HOTP(k, T)

T = Number of time steps between the initial counter time T0 and current system time

T = (Current System Time- T0) / X, Default Value of T0 = 0

X = Time steps in seconds

Default Value of X = 30

Basically we defined TOTP as :

Page 27: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 28: One-Time Password

PREVIOUS PASSWORD-BASED ALGORITHM

Lamport CINON PERM SAS SAS-2

Page 29: One-Time Password

LAMPORT ALGORITHM

The Registration Phase The Registration process is performed only once

The Authentication Phase The Authentication procedure is executed every time the user log in to the system

The Mechanism of Lamport’s algorithm consists of two phases :

Page 30: One-Time Password

LAMPORT REGISTRATION PHASE

Page 31: One-Time Password

LAMPORT ITH AUTHENTICATION PHASE

Page 32: One-Time Password

LAMPORT TYPE PROCEDURE

Page 33: One-Time Password

LAMPORT ALGORITHM

High hash overhead

Requirement of resetting the verifier (Password)

Lamport algorithm has two practical difficulties :

Page 34: One-Time Password

LAMPORT ALGORITHM

Lamport algorithm is a simple procedure, but the user must use a one-way hash function many times in every authentication session

Also user has to register after the M th authentication session

Page 35: One-Time Password

CINON (CHAIN ONE-WAY DATA VERIFICATION METHOD) ALGORITHM

High hash overhead and password resetting are solved

Using two variable random number which are changed at each authentication

Two random numbers are generated by the user and the user is required to memorize them

Page 36: One-Time Password

PERM (PRIVACY ENHANCED INFORMATION READING AND WRITING MANAGEMENT METHOD) ALGORITHM

Random number memorizing problem is solved

One random number is stored in the host and sent to the user at each authentication

Other random number is derived from this number by pre-determined increments

Page 37: One-Time Password

CINON AND PERM ALGORITHM

Security Flaw =

Replay Attack (Man in the Middle Attack)

Page 38: One-Time Password

SAS (SIMPLE AND SECURE) ALGORITHM

The SAS is the only one-time password authentication method which can change verifiers every session without limit.

Page 39: One-Time Password

SAS (SIMPLE AND SECURE) ALGORITHM

The Registration Phase The Registration process is performed only once

The Authentication Phase The Authentication procedure is executed every time the user log in to the system

The Mechanism of SAS algorithm consists of two phases :

Page 40: One-Time Password

SAS REGISTRATION PHASE

Page 41: One-Time Password

SAS ITH AUTHENTICATION PHASE

Page 42: One-Time Password

SAS PROCEDURE TYPE

Page 43: One-Time Password

SAS ALGORITHM

The SAS algorithm uses a one-way function five times.

This function has high overhead, because a one-way function apply hash functions or common-key cryptosystems.

The SAS and other methods are useless for low spec machine.

Page 44: One-Time Password

SAS-2 ALGORITHM

The SAS-2 algorithm can change verifiers every time and without limit

SAS-2 applies its function only three times by using two verifiers and another for masking

This reduces hash overhead by about 40% in comparison with SAS

A synchronous data communication procedure

Page 45: One-Time Password

SAS-2 ALGORITHM

The Mechanism of SAS-2 algorithm consists of two phases :

The Registration Phase The Registration process is performed only once

The Authentication Phase The Authentication procedure is executed every time the user log in to the system

Page 46: One-Time Password

SAS-2 REGISTRATION PHASE

Page 47: One-Time Password

SAS-2 ITH AUTHENTICATION PHASE

Page 48: One-Time Password

SAS-2 PROCEDURE TYPE

Page 49: One-Time Password

SAS-2 ALGORITHM USING CHALLENGE RESPONSE

If user cant’s store any data, the system can use the SAS-2 protocol using

challenge response method.

The user need not store the random number

Transmission iterations are increased

Page 50: One-Time Password

SAS-2 ALGORITHM USING CHALLENGE RESPONSE

The Mechanism of SAS-2 algorithm using challenge response consists of two phases :

The Registration Phase The Registration process is performed only once

The Authentication Phase The Authentication procedure is executed every time the user log in to the system

Page 51: One-Time Password

SAS-2 REGISTRATION PHASE USING CHALLENGE RESPONSE

Page 52: One-Time Password

SAS-2 ITH AUTHENTICATION PHASE USING CHALLENGE RESPONSE

Page 53: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 54: One-Time Password

MATHEMATICAL ALGORITHM PERFORMANCE ANALYSIS

Page 55: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 56: One-Time Password

METHODS OF DELIVERING

Paper SMS

Mobile Phone Token

Page 57: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 58: One-Time Password

TWO-FACTOR AUTHENTICATION

Instead of using only one type of authentication factor, such as only things a user knows (login IDs, passwords, secret images, shared secrets, solicited personal information, etc)

A second factor, something the user has or something the user is, must be supplied in order to authenticate

Page 59: One-Time Password

MULTI-FACTOR AUTHENTICATION

Two or more of the authentication factor required for being authenticated

Sometimes called strong authentication

An extension of two-factor authentication.

Page 60: One-Time Password

MULTI-FACTOR AUTHENTICATION

Something the user knows (password, PIN)

Something the user has (ATM card, smart card)

Something the user is (biometric characteristic, such as a fingerprint)

Existing authentication methodologies involve three basic “factors”:

Page 61: One-Time Password

MULTI-FACTOR AUTHENTICATION

One problem with multi-factor authentication generally is the lack of understanding of what constitutes "true" multi-factor authentication.

Page 62: One-Time Password

MULTI-FACTOR AUTHENTICATION

Supplying a username and password

Supplying additional information in the form of answers to challenge questions

Adding a visual image

Page 63: One-Time Password

MULTI-FACTOR AUTHENTICATION

True Multi-Factor Authentication :

User Knows User Has User Is

Page 64: One-Time Password

MULTI-FACTOR AUTHENTICATION

One-time password is certainly one of the simplest and most popular forms of two-factor authentication for securing network access.

Page 65: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 66: One-Time Password

DISCUSSION

Page 67: One-Time Password

AGENDA

1. Abstract

2. Need

3. Overview

4. Method of Generating

5. Algorithm

6. Performance Analysis

7. Method of Delivering

8. N-Factor Authentication

9. Discussion

10. References

Page 68: One-Time Password

REFERENCES

• Takasuke TSUJI, “A One-Time Password Authentication Method”

• Faqs.org, “RFC 2289 – A One-Time Password System”

• Faqs.org, “TOTP: Time-Based One-Time Password”

• Faqs.org, “RFC 4226 – HOTP: HMAC-Based One Time Password”

• RSA Security, “Open Specifications Integrates One-Time Passwords with Enterprise Applications”

• Manjula Sandirigama, Akihiro shimizu, Matu-Tarow Noda, “Simple and Secure Password Authentication Protocol”

• wikipedia.org, “One-Time Password”

• wikipedia.org, “Challenge-Response Authentication”

• wikipedia.org, “Hash Chain”

• wikipedia.org, “HMAC”

• wikipedia.org, “Multi-Factor Authentication”

• wikipedia.org, “Two-Factor Authentication”

• wikipedia.org, “Security Token”

• wikipedia.org, “Man In The Middle Attack”