HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.

Slides:



Advertisements
Similar presentations
User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Advertisements

Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
McAfee One Time Password
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
Visolve – Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Overview of proposed EAP methods, credential types, and uses Pasi Eronen IETF64 EMU BoF November 10 th, 2005.
Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
HASH ALGORITHMS - Chapter 12
FIT3105 Smart card based authentication and identity management Lecture 4.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
RSA SecurID ® Authentication Ellen Stuart CS265 Cryptography and Computer Security Fall 2004.
CertAnon A Proposal for an Anonymous WAN Authentication Service David Mirra CS410 January 30, 2007.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Certificate and Key Storage Tokens and Software
Apache Triplesec: Strong (2-factor)
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Authentication Approaches over Internet Jia Li
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Leveraging UICC with Open Mobile API for Secure Applications and Services Ran Zhou.
Remotely authenticating against the Service Framework.
CertAnon The feasibility of an anonymous WAN authentication service Red Group CS410 March 1, 2007.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
Two Factor Authentication On Mobile, Solution for tomorrow? Nicolas Fort, Product Manager Solution for today !
EMBEDDED SECURITY EEN 417 Fall /6/13, Dr. Eric Rozier, V1.0, ECE Thanks to Edward Lee and Sanjit Seshia of UC Berkeley.
TrustOTP: Smartphone as One-Time Password Token
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
EE515/IS523 Think Like an Adversary Lecture 4 Crypto in a Nutshell Yongdae Kim.
Chapter 21 Public-Key Cryptography and Message Authentication.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
Chapter 4 Application Level Security in Cellular Networks.
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
Two Factor Authentication Using Mobile Phones. Abstract In our project security and authentication plays a major role. It can be mainly used in online.
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
Providing secure mobile access to information servers with temporary certificates Diego R. López
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
ANSI X9.44 and IETF TLS Russ Housley and Burt Kaliski RSA Laboratories November 2002.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
RPSEC WG Issues with Routing Protocols security mechanisms Vishwas Manral, SiNett Russ White, Cisco Sue Hares, Next Hop IETF 63, Paris, France.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Innovation is Our Passion Online Banking Past, Present and Future.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Analysis of BFD Security According to KARP Design Guide draft-ietf-karp-bfd-analysis-01 draft-ietf-karp-bfd-analysis-01 Manav Bhatia Dacheng Zhang Mahesh.
2008 PHIN Conference, Session B-1
iSCSI X-key for enhanced supportability
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Using Two Factor Authentication To Secure Users Alan P. Barber
HMAC and its Design Objectives
draft-ietf-stir-oob-02 Out of Band
Presentation transcript:

HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005

March 10, nd IETF Meeting2 Agenda OTP and Open Standards HOTP Algorithm Next Step and Conclusion

March 10, nd IETF Meeting3 Static Vs. One-Time Passwords Static Passwords are inadequate –Identity theft and phishing are real threats –Spyware, key loggers are common One Time Passwords: –Easy for users to understand & use anywhere –Moving target (more difficult to steal) Two-factor authentication –What you know (your PIN, password, etc.) –What you have (a token that generates OTP)

March 10, nd IETF Meeting4 Need for open standard for OTP Several algorithms exist but all private –Proprietary tokens are expensive –Standardization drives down costs for end users –Open standards foster innovation (e.g HTTP, TCP/IP) No easy way for people to –Analyze security, integration and deployment cost –Get a free, easily available description –Get a reference implementation

March 10, nd IETF Meeting5 OTP Algorithm: Requirements Usability –Easy to look up OTP value and enter in the application –User-friendly mechanisms to resynchronize the moving factor Security (algorithm and protocol) Implementation flexibility (SIM, tokens, software, etc.) Economical to implement in hardware

March 10, nd IETF Meeting6 HOTP Algorithm Based on known primitives –HMAC: RFC 2104 –SHA-1: FIPS 180-1, RFC 3174 Open Standards –All basic blocks are public, free to use –HOTP is also public anybody can implement it at no cost a reference implementation in Java is in the draft a detailed security analysis is also available

March 10, nd IETF Meeting7 HOTP Algorithm: Description HOTP (Counter, Key) = Truncate(HMAC-SHA-1 (Counter, Key)) The Key is a shared secret between the prover (HOTP token) and the verifier (HOTP validation server) The Counter is a moving factor that needs to be synchronized between the prover and the verifier

March 10, nd IETF Meeting8 SHA-1 Attacks: No impact HOTP is based on HMAC HMAC is not a hash function, it uses a hash function internally A MAC depends on a secret key The issues with MAC constructions is forgery, not collisions Best example: MD5 is broken, though no attack on HMAC-MD5

March 10, nd IETF Meeting9 HOTP algorithm in the real world Implemented in various flavors –Software Token to generate OTP values On PC, PDAs, any mobile device –Hardware Tokens OTP and hybrid tokens (with other functionalities) – SIM Cards GSM phones turn into tokens to generate OTPs

March 10, nd IETF Meeting10 Next Step and Conclusion HOTP as an RFC –Open Standard, Freely available –Reference implementations Today java, tomorrow C, javacard, etc. RFC status will drive adoption –Early adopters will innovate –Embedding algorithm in all devices –Improving security for internet users