Response: Independent One-Time Passwords

نویسنده

  • Aviel D. Rubin
چکیده

It is understandable that Security Dynamics is sensitive to any article that is critical of their SecurID card. After all, their success is based on their cus-tomers' confidence that their one-time password scheme is unbreakable. Thus, it appears to me that they read my article in Computing Systems with an overþ-sensitive eye and misunderstood some of it. In this response, I will try to clarify some issues and address their objections. The first objection is to my statement that "One way to defeat SecurID is to break the secret algorithm to predict the next number that will be displayed." Security Dynamics claims that this makes it sound as if it is easy to do this. It was not my intention to imply that this was easy. The two sentences preceding the quoted one state: "There are several strategies for breaking SecurID. The product is sold on the premise that these are infeasible." Whether or not breaking SecurID is feasible is a matter of faith. It is widely accepted in the security and cryptography communities that the only way to trust a cryptographic algorithm is to publish it and subject it to the scrutiny of the'entire community. Otherwise, belief in the strength of the algorithm reduces to belief in the statements of the algorithm designer. The algorithm used by SecurID is not public.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

A simple scheme to make passwords based on one-way functions much harder to crack

We present a simple scheme that makes guessing passwords based on one-way functions 100 to 1000 times harder. The scheme is easy to program and easy to incrementally add to existing schemes. In particular, there is no need to switch to it all at the same time. Old passwords will still work and have the same security as before (one will not be able to distinguish them from new passwords); newly-...

متن کامل

Independent One-Time Passwords

Existing one-time password (OTP) schemes suffer several drawbacks. Token-based systems are expensive, while software-based schemes rely on one-time passwords that are dependent on each other.-There are disadvantages to authentication schemes that rely on dependent OTPs. It is difficult to replicate the authentication server without lowering security. Also, current authentication schemes based o...

متن کامل

Controversy: Rejoinder: Independent One-Time Passwords

Security Dynamics In order for Computing Systems to remain a "Quarterly dedicated to the analysis and understanding of advanced computing systems," it is necessary to make the following clarification regarding an article in the V/inter 1996 issue (Volume 9, Number 1). The article in question was entitled "Independent One-Time Passwords," and authored by Aviel D. Rubin of Bellcore. In this artic...

متن کامل

One-Time-Password-Authenticated Key Exchange

To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time password...

متن کامل

A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network

Password authentication using Hopfield Networks is presented in this paper .In this paper we discussed the Hopfield Network Scheme for Textual and graphical passwords, for which input Password will be converted in to probabilistic values. We observed how to get password authentication using Probabilistic values for Textual passwords and Graphical passwords. This study proposes the use of a Hopf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computing Systems

دوره 9  شماره 

صفحات  -

تاریخ انتشار 1996