Encryption-based 2FA for Server-side Qualified Signature Creation

Similar documents
SAP Single Sign-On 2.0 Overview Presentation

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

View from a European Trust Service Provider Server Signing: Return of experience and certification strategy

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Applying Cryptography as a Service to Mobile Applications

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Secure Signature Creation Device Protect & Sign Personal Signature, version 4.1

Key & Data Storage on Mobile Devices

A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL

Information Security

CERTIFICATION PRACTICE STATEMENT UPDATE

Mobile Electronic Payments

Exploring ADSS Server Signing Services

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

CoSign by ARX for PIV Cards

SecureCom Mobile s mission is to help people keep their private communication private.

SENSE Security overview 2014

Mobile Connect & FIDO

Webmail Using the Hush Encryption Engine

Guide to Data Field Encryption

Understanding Digital Certificates and Secure Sockets Layer (SSL)

How To Develop A Mobile Application On An Android Device

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

PrivateServer HSM Integration with Microsoft IIS

2 System Requirements and Authentication

VoteID 2011 Internet Voting System with Cast as Intended Verification

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

ViSolve Open Source Solutions

How Secure is Authentication?

Application Note: Onsight Device VPN Configuration V1.1

Norton Mobile Privacy Notice

Strong Authentication in details

White Paper: Multi-Factor Authentication Platform

NBT Bank Personal and Business Mobile Banking Terms and Conditions

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

Overview Keys. Overview

Deriving a Trusted Mobile Identity from an Existing Credential

Online E-Signing. Send and Sign Documents on the Internet Anywhere

NetIQ Advanced Authentication Framework

Sectra Communications ensuring security with flexibility

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Using the W3C WebCrypto API for Document Signing

Dynamic Query Updation for User Authentication in cloud Environment

Securing your Online Data Transfer with SSL

SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

PrivyLink Internet Application Security Environment *

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

T. Venkat Narayana Rao et al IJCSET October 2011 Vol 1, Issue 9,

Scalable Authentication

Moving to Multi-factor Authentication. Kevin Unthank


Mobile Application Development

Second Level Authentication Using QR Codes

Secure cloud access system using JAR ABSTRACT:

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Using etoken for Securing s Using Outlook and Outlook Express

BroadSAFE Enhanced IP Phone Networks

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Security in Android apps

ISO Information Security Management Systems Professional

Token User Guide. Version 1.0/ July 2013

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Secure Cloud Identity Wallet

Strong and Convenient Multi-Factor Authentication on Mobile Devices

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

PkBox Technical Overview. Ver

Longmai Mobile PKI Solution

Chapter 1: Introduction

Secure web transactions system

esign Online Digital Signature Service

Understanding digital certificates

Policy Based Encryption Z. Administrator Guide

Multi Factor Authentication API

Middleware- Driven Mobile Applications

Cornerstones of Security

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann

Welcome to cryptovision. cv cryptovision GmbH T: +49 (0) F: +49 (0) info(at)cryptovision.com

Leveraging SAML for Federated Single Sign-on:

The Security Behind Sticky Password

Secure distribution of the device identity in mobile access network. Konstantin Shemyak senior security specialist, Nokia Siemens Networks

Sync Security and Privacy Brief

ANZ transactive

Smart Card APDU Analysis

A Security Survey of Strong Authentication Technologies

ACCESSIBILITY CHALLENGES IN E-GOVERNMENT:

Transcription:

S C I E N C E P A S S I O N T E C H N O L O G Y Encryption-based 2FA for Server-side Qualified Signature Creation Christof Rath, christof.rath@iaik.tugraz.at Institute for Applied Information Processing and Communications Graz University of Technology, Austria www.iaik.tugraz.at

2 The Beginning: Smartcard-based Solutions Rollout costs: 10 per card + overheads Smartcard-based solutions require: Smartcard reader Driver/middleware software installation Usability issue! since 2003: 150k activations

2 The Beginning: Smartcard-based Solutions Rollout costs: 10 per card + overheads Smartcard-based solutions require: Smartcard reader Driver/middleware software installation Usability issue! since 2003: 150k activations Mitigation strategies: Online middleware (Java Applet) Modern browsers no longer support Java Applets

3 Alternative: Mobile Signatures Signature creation is triggered by mobile phone: No additional hard-/software Reduced rollout costs (existing user devices) Usable with mobile computing Increased usability and acceptance

4 Mobile Signature Solutions Mobile Signatures SIM-based Server-side + Private key on SIM Special SIM card Vendor lock-in Roaming Privacy issues

4 Mobile Signature Solutions Mobile Signatures SIM-based + Private key on SIM Special SIM card Vendor lock-in Roaming Privacy issues Server-side + Only SMS required + Ordinary SIM card + Roaming Private key at server Privacy issues

5 Server-side Qualified Signature Creation EU Signature Directive: Advanced electronic signature: Created using means that the signatory can maintain under their sole control

5 Server-side Qualified Signature Creation EU Signature Directive: Advanced electronic signature: Created using means that the signatory can maintain under their sole control Signing server stores private signing key in DB: Encrypted by HSM wrapping key Encrypted by user password

5 Server-side Qualified Signature Creation EU Signature Directive: Advanced electronic signature: Created using means that the signatory can maintain under their sole control Signing server stores private signing key in DB: Encrypted by HSM wrapping key Encrypted by user password Private signing key can only be used: With user consent (password) Inside a specific HSM (wrapping key)

6 Server-side Qualified Signature Creation To issue a signature the following steps are necessary: 1. Authenticate using phone number and password 2. Prepare decryption of private signing key 3. Send one-time password (OTP) via SMS 4. Verify OTP via web form 5. Decrypt and load private signing key into HSM 6. Sign document 7. Discard private signing key

7 Drawbacks of the SMS-based Authorization Cost-factor: In Austria, about 10,000 signatures/day at 5 /SMS 180,000 /year Could be payed by users acceptance, feasibility

7 Drawbacks of the SMS-based Authorization Cost-factor: In Austria, about 10,000 signatures/day at 5 /SMS 180,000 /year Could be payed by users acceptance, feasibility Security issues: Malicious software can access SMS (on some platforms) e.g., Euro Grabber Transmission of SMS may not be encrypted (via GSM)

8 Server-side Qualified Signature Creation To issue a signature the following steps are necessary: 1. Authenticate using phone number and password 2. Prepare decryption of private signing key 3. Send one-time password (OTP) via SMS 4. Verify OTP via web form 5. Decrypt and load private signing key into HSM 6. Sign document 7. Discard private signing key

9 Requirements of a New Solution Usability Platform independence Transaction binding Security Feasibility Cost efficiency

9 Requirements of a New Solution Usability Platform independence Transaction binding Security Feasibility Cost efficiency Billing Feasibility Reverse SMS Usability Standard OTP Transaction binding

10 Basic Concept Proof of possession: Of a device (a pre-shared key) By decrypting an authorization code (OTP)

10 Basic Concept Proof of possession: Of a device (a pre-shared key) By decrypting an authorization code (OTP) Security features: Forward secrecy by changing IV Data transfer via HTTPS connections Hardware keystore/arm TrustZone support possible Cryptographic transaction binding

11 Basic Concept Pairing To bind a mobile device to a user account: 1. S: Start Activation Generate code Send SMS 2. M: Continue Activation Open OTP-App Send activation code 3. Both DH key exchange Store shared secret

11 Basic Concept Pairing To bind a mobile device to a user account: 1. S: Start Activation Generate code Send SMS 2. M: Continue Activation Open OTP-App Send activation code 3. Both DH key exchange Store shared secret

11 Basic Concept Pairing To bind a mobile device to a user account: 1. S: Start Activation Generate code Send SMS 2. M: Continue Activation Open OTP-App Send activation code 3. Both DH key exchange Store shared secret

12 Basic Concept Usage To authenticate a user: 1. S: Verify password 2. M: Request OTP 3. S: Send encrypted OTP 4. M: Return decrypted OTP 5. S: Verify OTP

13 TanApp The TanApp was a first prototype: HTML5/Javascript-based Platform independence Web clip icons to provide app style UI Usability, Acceptance Keys stored in HTML5 local storage Usability, Security

14 TanApp Usage To issue a signature: 1. S: Verify password 2. M: Request OTP 3. M: Receive encrypted OTP 4. M: Display decrypted OTP 5. S: Verify OTP 6. S: Issue signatue

14 TanApp Usage To issue a signature: 1. S: Verify password 2. M: Request OTP 3. M: Receive encrypted OTP 4. M: Display decrypted OTP 5. S: Verify OTP 6. S: Issue signatue

14 TanApp Usage To issue a signature: 1. S: Verify password 2. M: Request OTP 3. M: Receive encrypted OTP 4. M: Display decrypted OTP 5. S: Verify OTP 6. S: Issue signatue

15 TanApp User Test Findings HTML5 well suited for platform-independent development HTML5 local storage unsuited for key material No hardware security features Binding lost when clearing browser cache Usability issue: Too similar to SMS-based solution

16 QR-TanApp The QR-TanApp was our second approach: Native Android app Usability, Acceptance Platform independence requires multiple apps Support for hardware security features Security Support for offline operation Acceptance

17 QR-TanApp Usage To issue a signature: 1. S: Verify password 2. M: Take picture of QR-tag 3. M: Encrypt OTP 4. M: Send encrypted OTP 5. S: Verify OTP 6. S: Issue signature

17 QR-TanApp Usage To issue a signature: 1. S: Verify password 2. M: Take picture of QR-tag 3. M: Encrypt OTP 4. M: Send encrypted OTP 5. S: Verify OTP 6. S: Issue signature

17 QR-TanApp Usage To issue a signature: 1. S: Verify password 2. M: Take picture of QR-tag 3. M: Encrypt OTP 4. M: Send encrypted OTP 5. S: Verify OTP 6. S: Issue signature

17 QR-TanApp Usage To issue a signature: 1. S: Verify password 2. M: Take picture of QR-tag 3. M: Encrypt OTP 4. M: Send encrypted OTP 5. S: Verify OTP 6. S: Issue signature

18 Conclusion SMS-delivered OTPs must be regarded outdated We have proposed a novel authentication scheme Higher level of security strong cryptographic algorithms hardware security support completely avoid SMS Enhanced usability QR-codes prevent users from manually copying unintelligible OTPs