Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Security token

From Wikipedia, the free encyclopedia
(Redirected fromHardware token)
Device used to gain access to restricted resource
This article'sfactual accuracy isdisputed. Review the definitions of "Security Token" and "Security Token Generator". Relevant discussion may be found on thetalk page. Please help to ensure that disputed statements arereliably sourced.(November 2024) (Learn how and when to remove this message)
ARadio-frequency identification card used to open a door.

Asecurity token is aperipheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, apassword.[1] Examples of security tokens include wirelesskey cards used to open locked doors, a banking token used as a digital authenticator for signing in toonline banking, or signing transactions such aswire transfers.

Security tokens can be used to store information such aspasswords,cryptographic keys used to generatedigital signatures, orbiometric data (such asfingerprints). Some designs incorporatetamper resistant packaging, while others may include smallkeypads to allow entry of aPIN or a simple button to start a generation routine with some display capability to show a generated key number. Connected tokens utilize a variety of interfaces includingUSB,near-field communication (NFC),radio-frequency identification (RFID), orBluetooth. Some tokens have audio capabilities designed for those who are vision-impaired.

Password types

[edit]
Example of keypad issued by a bank.

All tokens contain some secret information used to prove identity. There are four different ways in which this information can be used:

Static password token
The device contains a password that is physically hidden (not visible to the possessor), but is transmitted for each authentication. This type is vulnerable toreplay attacks.
Synchronous dynamic password token
A timer is used to rotate through various combinations produced by acryptographic algorithm. The token and the authentication server must have synchronized clocks.
Asynchronous password token
Aone-time password is generated without the use of a clock, either from aone-time pad or cryptographic algorithm.
Challenge–response token
Usingpublic key cryptography, it is possible to prove possession of a private key without revealing that key. The authentication server encrypts a challenge (typically a random number, or at least data with some random parts) with a public key; the device proves it possesses a copy of the matching private key by providing the decrypted challenge.

Time-synchronized, one-time passwords change constantly at a set time interval; e.g., once per minute. To do this, some sort of synchronization must exist between theclient's token and the authenticationserver. For disconnected tokens, this time-synchronization is done before the token is distributed to theclient. Other token types do the synchronization when the token is inserted into aninput device. The main problem with time-synchronized tokens is that they can, over time, become unsynchronized.[2] However, some such systems, such asRSA's SecurID, allow the user to re-synchronize the server with the token, sometimes by entering several consecutive passcodes. Most also cannot have replaceable batteries and only last up to 5 years before having to be replaced – so there is an additional cost.[3]Another type of one-time password uses a complex mathematical algorithm, such as ahash chain, to generate a series of one-time passwords from a secret shared key. Each password is unique, even when previous passwords are known. The open-sourceOATH algorithm is standardized;[citation needed] other algorithms are covered by USpatents. Each password is observably unpredictable and independent of previous ones, whereby an adversary would be unable to guess what the next password may be, even with knowledge of all previous passwords.

Physical types

[edit]
This sectionneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources in this section. Unsourced material may be challenged and removed.(March 2023) (Learn how and when to remove this message)

Tokens can containchips with functions varying from very simple to very complex, including multiple authentication methods.

The simplest security tokens do not need any connection to acomputer. The tokens have a physical display; the authenticating user simply enters the displayed number to log in. Other tokens connect to the computer using wireless techniques, such asBluetooth. These tokens transfer a key sequence to the local client or to a nearby access point.[4]

Alternatively, another form of token that has been widely available for many years is a mobile device which communicates using an out-of-band channel (like voice,SMS, orUSSD).

Still other tokens plug into the computer and may require a PIN. Depending on the type of the token, thecomputerOS will then either read the key from the token and perform a cryptographic operation on it, or ask the token's firmware to perform this operation.[citation needed]

A related application is the hardwaredongle required by some computer programs to prove ownership of thesoftware. The dongle is placed in aninput device and thesoftware accesses theI/O device in question toauthorize the use of thesoftware in question.

Commercial solutions are provided by a variety of vendors, each with their own proprietary (and often patented) implementation of variously used security features. Token designs meeting certain security standards are certified in theUnited States as compliant withFIPS 140, a federal security standard.[5] Tokens without any kind of certification are sometimes viewed as suspect, as they often do not meet accepted government or industry security standards, have not been put through rigorous testing, and likely cannot provide the same level of cryptographic security as token solutions which have had their designs independently audited by third-party agencies.[citation needed]

Disconnected tokens

[edit]
A disconnected token. The number must be copied into thePASSCODE field by hand.

Disconnected tokens have neither a physical nor logical connection to the client computer. They typically do not require a special input device, and instead use a built-in screen to display the generated authentication data, which the user enters manually themselves via akeyboard orkeypad. Disconnected tokens are the most common type of security token used (usually in combination with a password) in two-factor authentication for online identification.[6]

Connected tokens

[edit]

Connected tokens are tokens that must be physically connected to the computer with which the user is authenticating. Tokens in this category automatically transmit the authentication information to the client computer once a physical connection is made, eliminating the need for the user to manually enter the authentication information. However, in order to use a connected token, the appropriate input device must be installed. The most common types of physical tokens aresmart cards and USB tokens (also calledsecurity keys), which require a smart card reader and a USB port respectively. Increasingly,FIDO2 tokens, supported by the open specification groupFIDO Alliance have become popular for consumers with mainstream browser support beginning in 2015 and supported by popular websites and social media sites.[citation needed]

OlderPC card tokens are made to work primarily withlaptops. Type II PC Cards are preferred as a token as they are half as thick as Type III.

The audio jack port is a relatively practical method to establish connection between mobile devices, such asiPhone,iPad andAndroid, and other accessories.[citation needed] The most well known device is calledSquare, a credit card reader foriOS and Android devices.

Some use a special purpose interface (e.g. thecrypto ignition key deployed by the United StatesNational Security Agency). Tokens can also be used as a photoID card.Cell phones andPDAs can also serve as security tokens with proper programming.

Smart cards

[edit]
Main article:Smart card

Many connected tokens use smart card technology. Smart cards can be very cheap (around ten cents)[citation needed] and contain proven security mechanisms (as used by financial institutions, like cash cards). However, computational performance of smart cards is often rather limited because of extreme low power consumption and ultra-thin form-factor requirements.

Smart-card-basedUSB tokens which contain asmart card chip inside provide the functionality of both USB tokens and smart cards. They enable a broad range of security solutions and provide the abilities and security of a traditional smart card without requiring a unique input device. From thecomputer operating system's point of view such a token is a USB-connected smart card reader with one non-removable smart card present.[7]

Contactless tokens

[edit]

Unlike connected tokens, contactless tokens form a logical connection to the client computer but do not require a physical connection. The absence of the need for physical contact makes them more convenient than both connected and disconnected tokens. As a result, contactless tokens are a popular choice forkeyless entry systems and electronic payment solutions such asMobilSpeedpass, which usesRFID to transmit authentication info from a keychain token.[citation needed] However, there have been various security concerns raised about RFID tokens after researchers atJohns Hopkins University andRSA Laboratories discovered that RFID tags could be easily cracked and cloned.[8]

Another downside is that contactless tokens have relatively short battery lives; usually only 5–6 years, which is low compared toUSB tokens which may last more than 10 years.[citation needed] Some tokens however do allow the batteries to be changed, thus reducing costs.

Bluetooth tokens

[edit]
This section'stone or style may not reflect theencyclopedic tone used on Wikipedia. See Wikipedia'sguide to writing better articles for suggestions.(September 2016) (Learn how and when to remove this message)

TheBluetooth Low Energy protocols provide long lasting battery lifecycle of wireless transmission.

  • The transmission of inherent Bluetooth identity data is the lowest quality for supporting authentication.
  • A bidirectional connection for transactional data interchange serves for the most sophisticated authentication procedures.

Although, the automatic transmission power control attempts for radial distance estimates. The escape is available apart from the standardised Bluetooth power control algorithm to provide a calibration on minimally required transmission power.[9]

Bluetooth tokens are often combined with a USB token, thus working in both a connected and a disconnected state. Bluetooth authentication works when closer than 32 feet (9.8 meters). When the Bluetooth link is not properly operable, the token may be inserted into aUSBinput device to function.

Another combination is with asmart card to store locally larger amounts of identity data and process information as well.[10] Another is a contactless BLE token that combines secure storage and tokenized release of fingerprint credentials.[11]

In the USB mode of operation sign-off requires care for the token while mechanically coupled to the USB plug. The advantage with the Bluetooth mode of operation is the option of combining sign-off with distance metrics. Respective products are in preparation, following the concepts of electronic leash.

NFC tokens

[edit]

Near-field communication (NFC) tokens combined with a Bluetooth token may operate in several modes, thus working in both a connected and a disconnected state. NFC authentication works when closer than 1 foot (0.3 meters).[citation needed] The NFC protocol bridges short distances to the reader while the Bluetooth connection serves for data provision with the token to enable authentication. Also when the Bluetooth link is not connected, the token may serve the locally stored authentication information in coarse positioning to the NFC reader and relieves from exact positioning to a connector.[citation needed]

Single sign-on software tokens

[edit]

Some types ofsingle sign-on (SSO) solutions, likeenterprise single sign-on, use the token to store software that allows for seamless authentication and password filling. As the passwords are stored on the token, users need not remember their passwords and therefore can select more secure passwords, or have more secure passwords assigned. Usually most tokens store a cryptographic hash of the password so that if the token is compromised, the password is still protected.[12]

Programmable tokens

[edit]

Programmable tokens are marketed as "drop-in" replacement of mobile applications such asGoogle Authenticator (miniOTP[13]). They can be used as mobile app replacement, as well as in parallel as a backup.

Vulnerabilities

[edit]

Loss and theft

[edit]

The simplest vulnerability with any password container is theft or loss of the device. The chances of this happening, or happening unaware, can be reduced with physical security measures such as locks, electronic leash, or body sensor and alarm. Stolen tokens can be made useless by usingtwo factor authentication. Commonly, in order to authenticate, apersonal identification number (PIN) must be entered along with the information provided by the token the same time as the output of the token.

Attacking

[edit]

Any system which allows users to authenticate via an untrusted network (such asthe Internet) is vulnerable toman-in-the-middle attacks. In this type of attack, an attacker acts as the "go-between" of the user and the legitimate system, soliciting the token output from the legitimate user and then supplying it to the authentication system themselves. Since the token value is mathematically correct, the authentication succeeds and the fraudster is granted access. In 2006,Citibank was the victim of an attack when its hardware-token-equipped business users became the victims of a large Ukrainian-based man-in-the-middlephishing operation.[14][15]

Breach of codes

[edit]

In 2012, the Prosecco research team at INRIA Paris-Rocquencourt developed an efficient method of extracting the secret key from severalPKCS #11 cryptographic devices.[16][17] These findings were documented in INRIA Technical Report RR-7944, ID hal-00691958,[18] and published at CRYPTO 2012.[19]

Digital signature

[edit]

Trusted as a regular hand-written signature, thedigital signature must be made with a private key known only to the person authorized to make the signature. Tokens that allow secure on-board generation and storage of private keys enable secure digital signatures, and can also be used for user authentication, as the private key also serves as a proof of the user's identity.

For tokens to identify the user, all tokens must have some kind of number that is unique. Not all approaches fully qualify asdigital signatures according to some national laws.[citation needed] Tokens with no on-board keyboard or anotheruser interface cannot be used in somesigning scenarios, such as confirming a bank transaction based on the bank account number that the funds are to be transferred to.

See also

[edit]

References

[edit]
  1. ^Schink, Marc; Wagner, Alexander; Unterstein, Florian; Heyszl, Johann (2021-07-09)."Security and Trust in Open Source Security Tokens".IACR Transactions on Cryptographic Hardware and Embedded Systems:176–201.doi:10.46586/tches.v2021.i3.176-201.ISSN 2569-2925.S2CID 235349083.
  2. ^RD, Token2 (2019-01-07)."Time drift: a major downside of TOTP hardware tokens".Medium. Retrieved2020-11-21.{{cite web}}: CS1 maint: numeric names: authors list (link)
  3. ^"Time Drift in TOTP Hardware Tokens Explained and Solved - Protectimus Solutions".Protectimus. 2019-06-03. Retrieved2020-11-21.
  4. ^"2.3.3: Authentication Methods - Security Tokens".Engineering LibreTexts. 2021-01-15. Retrieved2023-05-08.
  5. ^National Institute of Standards and Technology (April 2019).Security requirements for cryptographic modules(PDF) (Report). Gaithersburg, MD: National Institute of Standards and Technology.doi:10.6028/nist.fips.140-3.
  6. ^de Borde, Duncan (2007-06-28)."Two-factor authentication"(PDF). Siemens Insight Consulting. Archived fromthe original(PDF) on 2012-01-12. Retrieved2009-01-14.
  7. ^Specification for Integrated Circuit(s) Cards Interface DevicesArchived 2005-12-29 at theWayback Machine, usb.org
  8. ^Biba, Erin (2005-02-14)."Does Your Car Key Pose a Security Risk?". PC World. Archived fromthe original on 2011-06-05. Retrieved2009-01-14.
  9. ^"Verfahren zum Steuern der Freigabe einer Einrichtung oder eines Dienstes, als Master ausgebildete Sendeempfangseinrichtung sowie System mit derartiger Einrichtung".dpma.de. Retrieved16 April 2018.
  10. ^"cgToken | certgate".www.certgate.com. Archived fromthe original on 2013-10-09.
  11. ^"Biometric U2F OTP Token - HYPR".HYPR Corp. Retrieved16 April 2018.
  12. ^"2.3.3: Authentication Methods - Security Tokens".Engineering LibreTexts. 2021-01-15. Retrieved2024-11-21.
  13. ^Programmable hardware tokens Token2 miniOTP
  14. ^Leyden, John (2006-07-13)."Phishers rip into two-factor authentication".The Register. Retrieved2018-09-25.
  15. ^Krebs, Brian (July 10, 2006)."Citibank Phish Spoofs 2-Factor Authentication".The Washington Post. Archived fromthe original on July 3, 2011. Retrieved2018-09-25.
  16. ^Sengupta, Somini (2012-06-25)."Computer Scientists Break Security Token Key in Record Time".New York Times. Retrieved2012-06-25.
  17. ^Owano, Nancy (2012-06-27)."Team Prosecco dismantles security tokens".Phys.org. Retrieved2014-03-29.
  18. ^"Prosecco :: Publications". Retrieved2014-03-29.
  19. ^"Accepted Papers CRYPTO 2012". Retrieved2014-03-29.
General references

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Security_token&oldid=1267319338"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp