Back to Search Start Over

Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Dietrich, Sven
Dhamija, Rachna
Mannan, Mohammad
van Oorschot, P. C.
Source :
Financial Cryptography & Data Security (978-3-540-77365-8); 2008, p88-103, 16p
Publication Year :
2008

Abstract

Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token). [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540773658
Database :
Complementary Index
Journal :
Financial Cryptography & Data Security (978-3-540-77365-8)
Publication Type :
Book
Accession number :
33897943
Full Text :
https://doi.org/10.1007/978-3-540-77366-5_11