SSL/TLS Session-Aware User Authentication Revisited
|
|
|
- Theodora McKenzie
- 10 years ago
- Views:
Transcription
1 SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger 1, Ralf Hauser 2, and David Basin 3 1 esecurity Technologies Rolf Oppliger Beethovenstrasse 10, CH-3073 Gümligen, Switzerland Phone/Fax: +41 (0) [email protected] 2 PrivaSphere AG Fichtenstrasse 61, CH-8032 Zürich, Switzerland Phone: +41 (0) , Fax: +41 (0) [email protected] 3 Department of Computer Science, ETH Zurich Haldeneggsteig 4, CH-8092 Zürich, Switzerland Phone: +41 (0) , Fax: +41 (0) [email protected] Abstract. Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLSbased e-commerce applications against MITM attacks, and we proposed an implementation based on impersonal authentication tokens. In this paper, we present a number of extensions and variations of SSL/TLS session-aware user authentication. More specifically, we address multiinstitution tokens, possibilities for changing the PIN, and possibilities for making several popular and widely deployed user authentication systems be SSL/TLS session-aware. Furthermore, we also investigate the technical feasibility and the security implications of software-based implementations of SSL/TLS session-aware user authentication. Keywords. Electronic commerce, security, phishing, pharming, man-inthe-middle attack, SSL/TLS protocol, SSL/TLS-aware user authentication 1 Introduction Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e- commerce applications, such as Internet banking, and there are only a few technologies that can be used to mitigate the risks. In [OHB05], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS-based e-commerce applications against MITM attacks. The main idea is to make the user authentication depend not only on the user s (secret) credentials, such as a
2 password or personal identification number (PIN), but also on state information related to the SSL/TLS session in which the credentials are being transferred to the server. The rationale behind this idea is that the server should have the possibility to determine whether the SSL/TLS session in which it receives the credentials is the same as the user employed when he sent out the credentials in the first place. If the two sessions are the same, then there is probably no MITM involved. If the two sessions are different, then something abnormal is going on. It is likely that a MITM is located between the user s client system and the server. Using SSL/TLS session-aware user authentication, the user authenticates himself by providing a user authentication code (UAC 4 ) that depends on both the credentials and the SSL/TLS session (in particular, information from the SSL/TLS session state). A MITM who gets hold of the UAC can no longer misuse it by simply retransmitting it. The key point is that the UAC is bound to a particular SSL/TLS session, and if the UAC is submitted on another session, then the server can easily recognize this fact and drop the session. As such, SSL/TLS session-aware user authentication provides a lightweight alternative to the deployment and rollout of a public key infrastructure (PKI) to protect against MITM attacks. 5 There are a number of possibilities to implement SSL/TLS session-aware user authentication. In [OHB05], we argued (i) that software-based implementations are inherently vulnerable, (ii) that one should therefore pursue hardware-based implementations in the first place, and (iii) that a particularly promising possibility is the use of hardware tokens, preferrably in the form of impersonal PKCS #11-compliant authentication tokens. While we are still in basic agreement with these points, we are less strict in this paper. In fact, we broaden the scope of our ideas and also consider possibilities to implement (parts of) SSL/TLS sessionaware user authentication in software, and investigate the security implications of doing this. Consequently, we make a distinction between hardware-based and software-based implementations of SSL/TLS session-aware user authentication. In the first case, we are talking about hardware tokens (i.e., hard-tokens). Such a token may be (physically) connected or not. 6 In the second case, we are talking about software tokens (i.e., soft-tokens). In either case, an authentication token can be personal or impersonal. Furthermore, it can be consistent with a cryptographic token interface standard, 4 In [OHB05], a UAC is referred to as a transaction authorization number (TAN). 5 Note, however, that the deployment and rollout of a PKI typically may have other objectives, e.g., the ability to provide nonrepudiation services. 6 We say that the token is physically connected, or just connected, if there is a direct communication path in place between the token and the client system. This includes, for example, galvanic connections, as well as connections based on wireless technologies, such as Bluetooth or infrared.
3 such as PKCS #11 [RSA04] or Microsoft s cryptographic application programming interface (CAPI). We assume that a standard CAPI driver is preinstalled on newer versions of the Windows operating system, and that this driver can be used by the Microsoft Internet Explorer to drive the token in some transparent way (from the user s viewpoint). On all other platforms, we assume that some PKCS #11 driver software must be installed to drive the token. This includes, for example, the case in which a Mozilla browser is employed on a Windows platform. For the remainder of this paper, we present a number of extensions and variations of SSL/TLS session-aware user authentication. To make the paper self-contained, we summarize the originally proposed token-based approach in Section 2. We then address multi-institution tokens, possibilities for changing the PIN, and possibilities for making several popular and widely deployed user authentication systems be SSL/TLS session-aware in Sections 3 5. In Section 6, we address the question whether (parts of) SSL/TLS session-aware user authentication can be reasonably implemented in software. Finally, we draw conclusions and provide an outlook in Section 7. 2 Token-Based Approach The implementation of SSL/TLS session-aware user authentication proposed in [OHB05] is based on impersonal authentication tokens. Each token holds a public key pair, 7 of which the private key is used to digitally sign CertificateVerify messages in the SSL/TLS handshake protocol. Each CertificateVerify message, in turn, represents a digitally signed hash value of all messages previously exchanged during the execution of the SSL/TLS handshake protocol. Part of these messages is the server s Certificate message, which comprises the server s public key certificate (the server s public key is included in this certificate). Consequently, the CertificateVerify message is logically bound to the server s public key. The following entities play a role in the originally proposed token-based approach: A user U; An impersonal authentication token T with a small display; A client (i.e., browser) C that is used by U to access an SSL/TLS-based application; An SSL/TLS-enabled server S that hosts the application. 8 The user U is identified with identifier ID U and holds P IN U (a secret PIN that U shares with S). T is identified by a publicly known serial number SN T. 7 It is possible to have the token only hold the private key. 8 We do not differentiate between S and the application it hosts. Conceptually, one may think of S as a dedicated server, i.e., a server that exclusively hosts only the application under consideration.
4 The serial number may, for example, be imprinted on the back side of the token. Furthermore, T is equipped with both a public key pair (k, k 1 ) of which the private key k 1 is used to digitally sign the CertificateVerify messages and a secret token key K T that is shared with S. The keys k and k 1 are the same for all tokens (which is why the tokens are impersonal), whereas K T is unique and specific to T (note, however, that it is not specific to the user). K T can be generated randomly or pseudo-randomly using a master key M K: K T = E MK (SN T ) In the first case (where K T is generated randomly), all token keys must be stored on the server S. In the second case (where K T is derived from SN T ), however, there is no need to centrally store all token keys on S. Instead, K T can be generated dynamically from SN T by anybody who holds MK. MK, in turn, is typically held exclusively by S. When U wants to access S, he directs C to S. C and S then try to establish an SSL/TLS session using the SSL/TLS handshake protocol. As part of this protocol, S authenticates itself using a public key certificate (at this point in time, we do not assume that the user properly verifies this certificate). S is configured in a way that it always requires client authentication by sending out a CertificateRequest message to C. When C receives the message, it knows that it must authenticate itself by returning a Certificate and a properly signed CertificateVerify message to S. As mentioned above, the CertificateVerify message must comprise a digitally signed hash value of all previously exchanged messages (the hash value is further referred to as Hash). The digital signature is generated by T using its private key k 1. Due to the fact that T is an impersonal token, the CertificateVerify message neither authenticates the token nor the client. Instead, the CertificateVerify message only ensures that C uses a token to establish an SSL/TLS session with S, and that the SSL/TLS session-aware user authentication mechanism gets access to Hash. Alternatively speaking, the token acts as a trusted observer. In addition to providing a properly signed CertificateVerify message to S, the token T also renders a shortened version of N T = E KT (Hash) on its display (for example, in decimal notation). In this case, E represents an encryption function that is keyed with K T. Alternatively, N T could also represent a message authentication code (MAC) computed with a keyed oneway hash function where K T is the key. 9 For example, the HMAC construction [KBC97] can be used to generate N T = HMAC KT (Hash). 9 In some circumstances, the use of a MAC is advantageous because keyed one-way hash functions are generally more efficient than symmetric encryption systems, and because there are usually no regulations on the use of (keyed) one-way hash functions (in contrast to the use of encryption systems).
5 In either case, N T can be shortened to the length of P IN U (e.g., 8 decimal digits) by truncating it. This value must then be combined with P IN U to generate a UAC that is valid for exactly one SSL/TLS session initiated by U. If f represents a function that combines N T and P IN U in some appropriate way, then the UAC can be expressed as follows: UAC = f(n T, P IN U ) (1) In general, there are many ways to define an appropriate function f. One possibility adopted from [MT93] is the digit-wise addition modulo 10. In this case, the UAC is the digit-wise modulo 10 sum of N T and P IN U, which is a function simple enough for users to compute themselves (e.g., in their heads). If the token comprises a keypad (to enter P IN U ), then the token can also be used to compute f. In this case, f can be a much more complex function. After a server-authenticated SSL/TLS session is successfully established between C and S, S authenticates U by asking him to provide ID U, SN T, and a valid UAC for the SSL/TLS session in current use. 10 On the server side, S can verify the UAC because it knows f and P IN U and because it can reconstruct N T since it knows Hash and the master key MK that is used to dynamically generate K T. There is nothing fundamentally different if the server knows a one-way hash value of P IN U (instead of P IN U ). This is a well-known security mechanism to protect the PINs (or passwords, respectively) from malicious system administrators or users that have gained access to the file that comprises the PINs [MT79]. In either case, the server authentication module must be designed in a way that it can access the SSL/TLS cache to retrieve Hash. Note that the token-based approach described so far neither requires synchronized clocks nor that nonces are sent back and forth between the entities involved in the user authentication. Instead, the approach employs a new idea, namely using nonces derived from the symmetrically encrypted hash values used by the SSL/TLS protocol. Also note that it is technically feasible to transfer the UAC as part of the SSL/TLS CertificateVerify message so that the user authentication can be handled entirely by the token (and hence the user does not have to enter anything in a Web form). There are at least three possibilities here: 1. T can digitally sign both the Hash value and the UAC. 2. T can digitally sign a keyed hash value (instead of the hash value Hash), where the UAC represents the key, Hash represents the argument, and the HMAC construction is used to key the hash function. 10 Note that the user need not enter SN T if this value is included in the public key certificate for T s private key k 1. In this case, the server S can retrieve SN T from the certificate. Similarly, one could also provide for the user to temporarily register with a specific token. In this case, S can retrieve ID U from its registration database and set it as a default value in the user authentication process. Note, however, that the binding between SN T and ID U is only weak.
6 3. T can only send the keyed hash value (instead of the digital signature). This possibility is similar to the second possibility the only difference is that the keyed hash value is not digitally signed. Consequently, there is no need to have a private signing key on the token. All of these possibilities require changes in the SSL/TLS handshake protocol and the way the SSL/TLS CertificateVerify message is used in the protocol. This is disadvantageous. However, a major advantage is that C (i.e., the browser) then remains unaffected and need not be altered in one way or another. This simplifies deployment considerably (because the server and the tokens are typically under the control of the service provider). Furthermore, the property that the client need not be altered obviously applies to all application protocols that may be layered on top of SSL/TLS (in addition to HTTP or HTTPS, respectively). 3 Multi-institution Tokens The notion of a multi-institution token was briefly mentioned in [OHB05]. As the name suggests, the idea is to allow T to be used by multiple institutions I, i.e., multiple institutions can use the same token for user authentication. The rationale behind multi-institution tokens is an economic one: it may be cost effective to have multiple institutions share a single token. A simple and straightforward possibility for implementing multi-institution tokens is to replace the master key MK with a set of institution-specific master keys MK I, and the token key with a set of institution-specific token keys K IT (where K IT refers to the secret token key that T shares with I). Similar to the single-institution case, the token key K IT can be generated dynamically according to K IT = E MKI (SN T ). Furthermore, this key can be used to generate institution-specific values for and N IT = E KIT (Hash) UAC = f(n IT, P IN IU ). The personal identification code P IN IU is used by user U to authenticate to institution I, i.e., P IN IU is user- and institution-specific. The resulting UAC can be employed by the user U to authenticate to (the server of) institution I. There is another possibility to implement multi-institution tokens. This possibility does not require the token to store K IT for each institution I. Instead, the token only stores a master key MK T that is shared with an authentication
7 server (AS). If the token T is used to authenticate user U to institution I, then T randomly generates a nonce N T and generates the following pair of UACs: UAC I = f (N T, P IN IU ) UAC AS = E MKT (N T ) The pair of UACs is then submitted to I. I, in turn, forwards UAC AS to AS for decryption, and AS returns back N T to I. It goes without saying that all communications between I and AS must take place over a secure channel, e.g., over a SSL/TLS session. Finally, I can use N T to verify P IN IU. In this scheme, the function f must be designed in such a way that it is computationally infeasible to recover P IN IU from UAC I and UAC AS. Either possibility to implement multi-institution tokens is useful in practice. If the set of institutions is more-or-less static, then the first possibility is advantageous since it does not require an authentication server. If, however, the set of institutions changes often, then the second possibility is more appropriate. 4 Changing the PIN The security of a token-based implementation of SSL/TLS session-aware user authentication largely depends on the fact that users never have to enter their PIN into the client system (e.g., in a Web form). Instead, they either use the PIN to compute the UAC in their head or they directly enter the PIN in the authentication token in use. If one weakens this constraint, then users are vulnerable to the doppelganger window attack [JM05]. In such an attack, the adversary pops up a faked window to request user credentials. Since a user is typically not able to distinguish original and faked windows, it is likely that he enters his credentials into any window that asks for them. As of this writing, there is no technology that fully protects against this attack (this includes, for example, Delayed Password Disclosure (DPD) proposed in [JM05]). This situation is unsatisfactory and we return to this problem in Section 6 (when we elaborate on soft-tokens). The fact that users are preferrably taught to never enter their PIN into a client system considerably complicates changing the PIN. Normally, one would implement a Web form in which the user can change his PIN interactively. Since we disallow Web forms, we must provide other means to allow PIN changes. In either case, there must be some mechanism in place that allows a user to signal to the server that he wants to change his PIN and to protect the new PIN P IN new U with the old PIN P IN old U. Let us assume that the user has authenticated himself using an SSL/TLS session with an UAC, and that he has signaled to the server that he wants to change his PIN (using, for example, a Web form, or another mechanism for other application protocols layered on top of SSL/TLS). The server can then establish an auxiliary SSL/TLS session and send back to the browser a Web
8 form in which the user is requested to enter a PIN change code (PCC). Again, the token displays N T for the auxiliary SSL/TLS session, and the user (or token) can compute a PCC (instead of a UAC) as P CC = f (N T, P INU old, P INU new ). Here, f represents an arbitrary (but appropriately chosen) function that allows the server to recover P INU new from the PCC. This excludes, for example, the use of hash functions. In the reference example of [OHB05], f represents the digit-wise addition modulo 10, and hence f can be defined as f (N T, P IN old U, P IN new U ) = f(f(n T, P INU old ), P INU new ). Let, for example, N T = 123, P INU old new = 345, and P INU = 781. In this case, f(n T, P INU old) = 468 and f(f(n T, P INU old new ), P INU ) = 149. Consequently, the server can retrieve P INU new from the PCC 149 submitted by the user. Note that the PCC can also be tranferred as part of the SSL/TLS CertificateVerify message as discussed at the end of Section 2 (again, this requires the server to properly interprete this SSL/TLS protocol message). Also note that the PCC is sent over an SSL/TLS session. Since the SSL/TLS protocol protects the integrity of all messages (by sending a MAC at the end of each SSL/TLS record) it is infeasible for an adversary to modify the PCC, e.g., by flipping bits. 5 Making User Authentication Systems SSL/TLS Session-aware There are many user authentication systems that can be employed in an SSL/TLS setting and almost all of them are susceptible to MITM attacks. 11 In the remainder of this paper, we elaborate on how to make some popular and widely deployed user authentication systems be SSL/TLS session-aware in a way that provides protection against MITM attacks. We distinguish between one-time password (OTP) and challenge-response systems. In the following section, we then elaborate on the technical feasibility and the security implications of software-based implementations of SSL/TLS session-aware user authentication. 5.1 OTP Systems There are basically three classes of OTP systems: 1. Physical lists of OTPs. Examples include scratch lists and access cards, as well as lists of transaction authentication numbers (TANs) and indexed TANs (itans). 11 A proof-of-concept for indexed TANs (itans) was developed by the Arbeitsgruppe Identitätsschutz im Internet e.v. at the University of Bochum in Germany (cf.
9 2. Software-based OTP systems. Examples include Lamport-style [Lam81] OTP systems, such as Bellcore s S/Key [Hal95] and the one-time passwords in everything (OPIE) system [HM96]. 3. Hardware-based OTP systems. Examples include SecurID and SecOVID tokens. Note that most hardware-based OTP systems are not connected to the client systems. This makes the enrollment and deployment of these tokens considerably simpler (than the ones that are connected to the client systems). It also makes them resistant to malware attacks. In [OHB05], we briefly mentioned how to use impersonal authentication tokens to complement hardware-based OTP systems, such as SecurID tokens, in the sense that the resulting (combined) authentication system is SSL/TLS session-aware. In short, U employs the OTP as input for f (instead of P IN U ) in formula (1). Consequently, the UAC computed is UAC = f(n T, OT P ). Everything else (including, for example, the construction of N T ) remains the same. The disadvantage of this approach is that the user must have two tokens (i.e., the original OTP token and the impersonal authentication token). This is likely to be unacceptable in practice and therefore the use of a softwarebased OTP system seems to be appropriate. In this case, the OTP system is implemented in software and is complemented by a hard-token. Again, the use of soft-tokens is addressed in the following section. A simple trick is required to make lists of OTPs be SSL/TLS session-aware. Namely, a compression function compress implemented in the token can be used to compress Hash in a way that the result, i.e., compress(hash), may serve as an index in the list of OTPs. If, for example, compress(hash) = 37, then the 37 th entry in the list represents the OTP that must be used. Due to the fact that collisions are likely to occur, a collision resolution strategy is needed. Since the server can keep track of previously used values, we can require that the server initiates an SSL/TLS session renegotiation, or that the client and the server both compute an offset value (for the list of OTPs). In the second case, the offset value must be computed pseudo-randomly from the SSL/TLS session state. In either case, it is obvious that a list of OTPs should be replaced long before all OTPs on the list are used (otherwise, collisions become frequent and the performance decreases considerably). 12 Once the appropriate OTP is found (in the list of OTPs), it can be entered together with P IN U in the token. The token, in turn, uses the Hash value and an appropriately chosen function f to compute a UAC: UAC = f (P IN U, OT P, Hash) (2) 12 The question when to replace the lists of OTP is an optimization problem. In either case, a replacement must be requested and initiated by the server.
10 In this formula, Hash is required to protect against a trivial MITM attack. If the list of OTPs is relatively short and the MITM needs a specific OTP to authenticate to the server (on behalf of the user), then the MITM can simply initiate a series of SSL/TLS session renegotiation or computation of offset values until the appropriate OTP is found. If Hash is included in the UAC computation, then it is no longer sufficient for the MITM to have the appropriate OTP. Furthermore, Hash provides a salt value that makes it computationally more expensive to precompute tables of valid P IN U -OT P pairs for specific UAC values. This, in turn, makes off-line guessing attacks more difficult to launch. In either case, the UAC can be entered by the user in a Web form, or it can be tranferred as part of the SSL/TLS CertificateVerify message as discussed at the end of Section 2. In the second case, one may also use a nonce N (instead of Hash) to randomize the UAC. 13 For example, N may be added bitwise modulo 2 to the UAC, and N may be encrypted with a public key of the server S (i.e, k S ). Both values UAC N and E ks (N) are then transferred as part of the SSL/TLS CertificateVerify message to S. S, in turn, can use its private key k 1 S to decrypt N and extract the UAC from UAC N. Alternatively, one may also work with 2 nonces. In this case, one of the nonces may be used for mutual authentication (i.e., to authenticate the server to the client). 5.2 Challenge-Response Systems Informally speaking, a challenge-response (CR) system is an authentication system in which the entity that is authenticated (typically the client) is provided with a challenge for which it must compute an appropriate response to the entity that is authenticating (typically the server). In contrast to OTP systems, CR systems are often implemented in hardware. The corresponding (hardware) tokens may or may not be connected to the client systems using some cryptographic token interface standard, such as PKCS #11 or CAPI. There is a simple and straightforward possibility to make a CR system be SSL/TLS session-aware: instead of having the server provide a challenge to the client, the client and the server use N T as a challenge, which is cryptographically protected using the token key K T as a shared secret. The resulting UAC is the response that is computed according to formula (1). We distinguish between two cases depending on whether the token is connected to the client system or not. 1. If the token is connected to the client system, then it is simple and straightforward to make the user authentication be SSL/TLS session-aware. In this case, Hash is sent to the token, and the token can use it to compute N T. The user must additionally input P IN U, so that the token can compute the UAC according to formula (1). 2. If the token is not connected to the client system, then there is no direct communications path between the client and the token. This means that 13 In this case, the formula (2) to compute the UAC only takes P IN U and the OTP as arguments. This simplifies things considerably from the user s point of view.
11 there must be a possibility to communicate SSL/TLS state information from the browser to the token. One possibility, which is further addressed in the following section, is to have the browser display some digits of Hash in the graphical user interface (GUI) in some authentic way. The user can read these digits and enter them together with P IN U in the token. The token, in turn, can again use formula (1) to compute the UAC. The major advantage of the first case, where the token is connected, is that the user interaction is straightforward. Furthermore, one can use N T in its entire length and thereby provide better protection against PIN guessing attacks. The major disadvantage is the necessity to install a token driver on the client system (unless one uses only Windows-based client systems and platforms). The major advantage of the second case, where tokens are not connected, is that there is no need for a token interface, and hence, a token driver need not be installed. The major disadvantage is that the browser must be modified so that its GUI display some digits of Hash. This point is further addressed in the following section. In either case, the UAC must be displayed on the token and the user must enter the UAC in the appropriate Web form. Alternatively, the UAC can also be tranferred as part of the SSL/TLS CertificateVerify message as discussed at the end of Section 2. 6 Software-based Implementations So far, we have assumed that all tokens are hardware-based, meaning that we only have to deal with hard-tokens. We now weaken this assumption and elaborate on the technical feasibility and the security implications of software-based implementations of SSL/TLS session-aware user authentication. In a software-based implementation, the hard-token is replaced with a softtoken, meaning that the token s functionality is simulated in software, and that the token s display is emulated on the display of the client system. The softtoken may still be compliant to PKCS #11, CAPI, or any other cryptographic token interface standard. In this case, the basic functionality and interface of the soft-tokens remain essentially the same (as compared to the hard-tokens). On the one hand, soft-tokens are flexible and less expensive than hardware-based solutions. On the other hand, however, soft-tokens have to deal with (at least) two security problems: 1. Soft-tokens are inherently vulnerable to malware and keylogger attacks. Malware can do many things, including, for example, reading out cryptographic keys. Keylogger attacks typically try to retrieve the user credentials when they are typed in. 2. Soft-tokens are vulnerable to visual spoofing attacks. Both problems are difficult to solve. Keylogger attacks can be partially solved by displaying a keyboard on the client screen and having the user type in his credentials using this keyboard. The second problem is particularly tricky. One
12 has to find means to have the soft-token s GUI display authentic information. As of this writing, there are only a few (visual) technologies that can be used for this purpose (e.g.,[ys02, DT05]). In one way or another, a software-based implementation of SSL/TLS sessionaware user authentication must have access to some SSL/TLS state information, in particular the Hash value. If the soft-token is consistent with PKCS #11 or CAPI, then it has immediate access to this information (similar to the hard-token). In this case, the implementation of the soft-token is essentially the same. This includes, for example, the necessity to install driver software on the client system. If, however, the soft-token is not consistent with PKCS #11 or CAPI, then it has no immediate access to this information. In this case, the situation is slightly more involved and one must employ other means to access the Hash value. One possibility is to modify the browser in a way that it is able to render and display the first digits of the Hash (or compress(hash), respectively) value as it appears in the execution of the SSL/TLS handshake protocol. These digits can, for example, be displayed near the closed padlock icon that marks the SSL/TLS session (typically at the bottom right of the bowser window). The character set and length of compress(hash) may be configurable, and thereby meet the requirements of different user authentication mechanisms and systems. In the second case, the users can be equipped with a (typically small) program that implements a UAC calculator. If, for example, we work with lists of OTPs, then the user can employ the first digits of Hash as an index in the list of OTPs. The OTP found in the list must be entered by the user together with P IN U and Hash into the UAC calculator, and the UAC calculator must compute and display the currently valid UAC according to formula (2). This value must then be entered by the user in a Web form or transferred to the server S as part of the SSL/TLS CertificateVerify message. In the second case, we have the possibility to work with nonces encrypted with a server public key instead of Hash (cf. Section 5.1). The big advantage we see in this case is that there is no secret key that must be stored on the token. In either case, the user must have the assurance that the first digits of Hash displayed by the soft-token are authentic and can somehow be verified. Otherwise, an attacker can fake the digits and use the UAC to launch a PIN guessing attack. We already mentioned the fact that this problem is not trivial and that there are only a few technologies available. 7 Conclusions and Outlook Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking, and there are only a few technologies that can be used to mitigate the corresponding risks. In [OHB05],
13 we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS-based e-commerce applications against MITM attacks, and we proposed an implementation based on impersonal authentication tokens. In this paper, we presented a number of extensions and variations of SSL/TLS sessionaware user authentication. More specifically, we proposed multi-institution tokens, possibilities for changing the PIN, and possibilities for making several popular and widely deployed user authentication systems be SSL/TLS session-aware. In addition, we have also described the technical feasibility and the security implications of software-based implementations. We think that these extensions and variations are important to implement SSL/TLS session-aware user authentication in a practical (real-world) setting. This is particularly true for soft-tokens and hard-tokens that are not physically connected to the client systems. These tend to be less secure but simpler to deploy than their connected counterparts. Our next steps will be to prototype the above-mentioned possibilities to make lists of OTPs (e.g., access cards) and EMV cards that implement Mastercard s chip authentication program (CAP) or Visa s dynamic passcode authentication be SSL/TLS session-aware. In the first case, we intend to employ soft-tokens, whereas in the second case, we intend to integrate the functionality into existing hard-tokens. In either case, we think that both possibilities have a large potential, mainly because the corresponding authentication systems are (and will be) widely deployed in practice. In fact, many banks are using lists of OTPs and consider the replacement of these lists with EMV cards in the future. References [DT05] Dhamija, R., and J.D. Tygar, The Battle Against Phishing: Dynamic Security Skins, Proceedings of the 2005 ACM Symposium on Usable Security and Privacy (SOUPS 2005), ACM Press, July 2005, pp [Hal95] Haller, N., The S/KEY One-Time Password System, Request for Comments 1760, February [HM96] Haller, N., and C. Metz, A One-Time Password System, Request for Comments 1938, May [JM05] Jakobsson, M., and S. Myers, Stealth Attacks and Delayed Password Disclosure, [KBC97] Krawczyk, H., M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, Request for Comments 2104, February [Lam81] Lamport, L., Password Authentication with Insecure Communication, Communications of the ACM, Vol. 24, 1981, pp [MT79] Morris, R., and K. Thompson, Password security: a case history, Communications of the ACM, Vol. 22, Issue 11, November 1979, pp [MT93] Molva, R., and G. Tsudik, Authentication Method with Impersonal Token Cards, Proceedings of IEEE Symposium on Research in Security and Privacy, IEEE Press, May [OHB05] Oppliger, R., Hauser, R., and D. Basin, SSL/TLS Session-Aware User Authentication Or How to Effectively Thwart the Man-in-the-Middle, submitted for publication [RSA04] RSA Laboratories, PKCS #11 v2.20: Cryptographic Token Interface Standard, June 28, 2004.
14 [YS02] Ye, Z.E., and S. Smith, Trusted Paths for Browsers, Proceedings of the USENIX Security Symposium, 2002, pp
Browser Enhancements to Support SSL/TLS Session-Aware User Authentication
Browser Enhancements to Support SSL/TLS Session-Aware User Authentication Rolf Oppliger 1, Ralf Hauser 2, and David Basin 3 1 esecurity Technologies Rolf Oppliger Beethovenstrasse 10, CH-3073 Gümligen,
SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates
SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates Rolf Oppliger 1 Ralf Hauser 2 David Basin 3 1 esecurity Technologies Beethovenstrasse 10, CH-3073 Gümligen
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf Oppliger 1, Ralf Hauser 2, David Basin 3, Aldo Rodenhaeuser 4 und Bruno Kaiser 4 1 esecurity Technologies, Beethovenstrasse
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
Voucher Web Metering Using Identity Management Systems
Voucher Web Metering Using Identity Management Systems Fahad Alarifi Abstract Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Hash Functions. Integrity checks
Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, NIST Special Publication 800-63 Version 1.0.2 (dated April 2006), has been superseded and is provided here only for historical purposes. For the most current
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
SSL Server Rating Guide
SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Scalable RFID Security Protocols supporting Tag Ownership Transfer
Scalable RFID Security Protocols supporting Tag Ownership Transfer Boyeon Song a,1, Chris J. Mitchell a,1 a Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, UK
Kerberos. Guilin Wang. School of Computer Science, University of Birmingham [email protected]
Kerberos Guilin Wang School of Computer Science, University of Birmingham [email protected] 1 Entity Authentication and Key Exchange In the last talk, we discussed key exchange and reviewed some concrete
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Message authentication and. digital signatures
Message authentication and " Message authentication digital signatures verify that the message is from the right sender, and not modified (incl message sequence) " Digital signatures in addition, non!repudiation
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
How CA Arcot Solutions Protect Against Internet Threats
TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can table of contents executive summary 3 SECTION 1: CA ArcotID Security
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
YubiKey Integration for Full Disk Encryption
YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The
User Identification and Authentication Concepts
Chapter 1 User Identification and Authentication Concepts The modern world needs people with a complex identity who are intellectually autonomous and prepared to cope with uncertainty; who are able to
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks Whitepaper W H I T E P A P E R OVERVIEW Arcot s unmatched authentication expertise and unique technology give organizations
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
ViSolve Open Source Solutions
ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs
Reparing HTTP authentication for Web security
Reparing HTTP authentication for Web security Yutaka OIWA 1 Overview This position paper proposes improvement efforts for HTTP authentication/authorization mechanisms, to solve various current problems
Hitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Analysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
