SlideShare a Scribd company logo
1 of 3
Download to read offline
Design Methodologies for building a Robust
       Whitepaper
                                  Two Factor Authentication System

                                  During March 2011, market Leader in Authentication product announced
                                  that an Advanced Persistent Threat (APT) attack has happened ‘specifically
                                  related to their two-factor authentication product”. This led to loss of
                                  millions of dollars to the customers & vendor. It has also resulted in
Common Design Pitfalls in
                                  replacement of authentication products in multiple government
building Two Factor               organizations and enterprises. This kind of APT attack can potentially
Authentication Systems:           compromise the following elements of an Authentication System:
                                  1.     Records of seeds used in tokens
- One of the factors in 2FA
                                  2.     Relationship of those seeds to specific token serial numbers
system typically “What User
                                  3.     Relationship of seeds or token serial numbers to specific clients
Knows” is not strong enough
                                  4.     Information regarding algorithm that could expose mathematical and
and becomes the Weakest           cryptographic weaknesses
Link in case of potential         5.     Information regarding specific implementations of the algorithm that
compromise scenario.              may reveal implementation weaknesses

- No Strong coupling between
                                  Even if any one of the above happens, the whole authentication mechanism
the two factors of the 2FA
                                  can be circumvented and will help attackers to compromise the whole
System.                           system.
- Storing of User Sensitive
                                  Design Guidelines to provide protection against APT attacks
information with the product
vendor at central location        To avoid the kind of APT attack that happened recently, the authentication
                                  systems should be designed and developed to survive any compromises that
- In case of future
                                  happen to Product Vendor itself in future. Following are the design
compromise of authentication      considerations to be taken into account when designing an Authentication
system, inability to seamlessly   System.
transition to alternative
methods
                                  1. Not storing records of seeds used in tokens at central location:
- High dependency on
Algorithms which is used for      Product Vendors should not hold/posses the seeds information of the
authentication.                   tokens/hardware device it delivers (the device which is supposed to act as
                                  one of the factors of Two Factor authentication System). The best way is to
                                  avoid the storage of User Specific Seeds totally at a central location that can
                                  be potentially compromised in future. Use of challenge-response based
                                  system (where the user provides the response to the challenge based on
                                  something he knows and something he has) instead of time synchronized
                                  system may avoid the need of storing user specific sensitive information at
                                  central location.
Designing a Robust Two Factor Authentication Product - Whitepaper




                               2. Not storing any relationship information between seeds and
                               token serial numbers:

                               Storing the mapping between the seeds and serial numbers of the tokens
Impact of recent APT attacks   should be avoided, as it leads to easily access the sensitive information of the
on Vendor’s Two Factor         token (which is something the user has as part of two factor authentication).
Authentication Product:        The information stored about hardware should be random and should not
                               reveal the specific sensitive details about the hardware possessed by the
- Attack on Lockheed Martin—
                               user. And moreover the information stored should be encrypted using
the largest U.S. military      strongest encryption algorithms like “AES (Advanced Encryption Standard”)
contractor                     and “Triple DES”.
- L-3 Communications has
discovered a breach due to     3. Using multiple algorithms for added strength:
cloned tokens
                               Using a specific algorithm with the pre-set seed values for all the clients
- Many contractors including   could expose the mathematical and cryptographic weakness of the system
Northrop Grumman, has          once the algorithm is exposed and the seed value database is compromised.
                               So, instead of having one algorithm it is better to have variant of algorithms
disabled tokens as a
                               that solve the same purpose and different customers should be given with
precautionary method in wake
                               different algorithms. So the vulnerabilities in one algorithm may affect only
of APT attack that happened
                               small set of customers and the algorithms can be replaceable immediately as
on product vendor              an upgrade if the customer feels that his system has been compromised.


                               4. Leveraging multiple initialization vectors known only to
                               Customer:

                               The strength of the authentication system should not only come from the
                               algorithm or the robust implementation of the system. It should also posses
                               the capability of taking initialization vectors for the algorithm that’s been
                               implemented. The customers should be given the authority to initialize the
                               system with a set of random values of their wish and should not be known
                               even to the authentication product vendor. In this way, even if the source
                               code exposes the implementation weakness of the system, it does not create
                               vulnerability, as each customer poses different initialization vectors which
                               are proprietary to them.




                                                                                                        Page 2
Designing a Robust Two Factor Authentication Product - Whitepaper




Conclusion

By following above design methodologies, a two factor authentication
system can be made more robust against the kind of APT attacks that has
been witnessed recently. ArrayShield’s IDAS Two-factor Challenge-response
based authentication product is developed by following the design
methodologies as explained above; which makes it one of the most secure
Authentication Systems available in the market.




                                         ABOUT ARRAYSHIELD
Array Shield Technologies is the maker of software security products in the
area of Multi-Factor Authentication. The company’s mission is to provide
highly secure, cost effective and easy to use software security solutions
globally.

For more information, visit us at www.arrayshield.com




                                                                       Page 3

More Related Content

More from ArrayShield Technologies Private Limited (7)

PCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield ProductPCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield Product
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Problems with biometric authentication
Problems with biometric authenticationProblems with biometric authentication
Problems with biometric authentication
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
 
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Building a Robust Two Factor Authentication System

  • 1. Design Methodologies for building a Robust Whitepaper Two Factor Authentication System During March 2011, market Leader in Authentication product announced that an Advanced Persistent Threat (APT) attack has happened ‘specifically related to their two-factor authentication product”. This led to loss of millions of dollars to the customers & vendor. It has also resulted in Common Design Pitfalls in replacement of authentication products in multiple government building Two Factor organizations and enterprises. This kind of APT attack can potentially Authentication Systems: compromise the following elements of an Authentication System: 1. Records of seeds used in tokens - One of the factors in 2FA 2. Relationship of those seeds to specific token serial numbers system typically “What User 3. Relationship of seeds or token serial numbers to specific clients Knows” is not strong enough 4. Information regarding algorithm that could expose mathematical and and becomes the Weakest cryptographic weaknesses Link in case of potential 5. Information regarding specific implementations of the algorithm that compromise scenario. may reveal implementation weaknesses - No Strong coupling between Even if any one of the above happens, the whole authentication mechanism the two factors of the 2FA can be circumvented and will help attackers to compromise the whole System. system. - Storing of User Sensitive Design Guidelines to provide protection against APT attacks information with the product vendor at central location To avoid the kind of APT attack that happened recently, the authentication systems should be designed and developed to survive any compromises that - In case of future happen to Product Vendor itself in future. Following are the design compromise of authentication considerations to be taken into account when designing an Authentication system, inability to seamlessly System. transition to alternative methods 1. Not storing records of seeds used in tokens at central location: - High dependency on Algorithms which is used for Product Vendors should not hold/posses the seeds information of the authentication. tokens/hardware device it delivers (the device which is supposed to act as one of the factors of Two Factor authentication System). The best way is to avoid the storage of User Specific Seeds totally at a central location that can be potentially compromised in future. Use of challenge-response based system (where the user provides the response to the challenge based on something he knows and something he has) instead of time synchronized system may avoid the need of storing user specific sensitive information at central location.
  • 2. Designing a Robust Two Factor Authentication Product - Whitepaper 2. Not storing any relationship information between seeds and token serial numbers: Storing the mapping between the seeds and serial numbers of the tokens Impact of recent APT attacks should be avoided, as it leads to easily access the sensitive information of the on Vendor’s Two Factor token (which is something the user has as part of two factor authentication). Authentication Product: The information stored about hardware should be random and should not reveal the specific sensitive details about the hardware possessed by the - Attack on Lockheed Martin— user. And moreover the information stored should be encrypted using the largest U.S. military strongest encryption algorithms like “AES (Advanced Encryption Standard”) contractor and “Triple DES”. - L-3 Communications has discovered a breach due to 3. Using multiple algorithms for added strength: cloned tokens Using a specific algorithm with the pre-set seed values for all the clients - Many contractors including could expose the mathematical and cryptographic weakness of the system Northrop Grumman, has once the algorithm is exposed and the seed value database is compromised. So, instead of having one algorithm it is better to have variant of algorithms disabled tokens as a that solve the same purpose and different customers should be given with precautionary method in wake different algorithms. So the vulnerabilities in one algorithm may affect only of APT attack that happened small set of customers and the algorithms can be replaceable immediately as on product vendor an upgrade if the customer feels that his system has been compromised. 4. Leveraging multiple initialization vectors known only to Customer: The strength of the authentication system should not only come from the algorithm or the robust implementation of the system. It should also posses the capability of taking initialization vectors for the algorithm that’s been implemented. The customers should be given the authority to initialize the system with a set of random values of their wish and should not be known even to the authentication product vendor. In this way, even if the source code exposes the implementation weakness of the system, it does not create vulnerability, as each customer poses different initialization vectors which are proprietary to them. Page 2
  • 3. Designing a Robust Two Factor Authentication Product - Whitepaper Conclusion By following above design methodologies, a two factor authentication system can be made more robust against the kind of APT attacks that has been witnessed recently. ArrayShield’s IDAS Two-factor Challenge-response based authentication product is developed by following the design methodologies as explained above; which makes it one of the most secure Authentication Systems available in the market. ABOUT ARRAYSHIELD Array Shield Technologies is the maker of software security products in the area of Multi-Factor Authentication. The company’s mission is to provide highly secure, cost effective and easy to use software security solutions globally. For more information, visit us at www.arrayshield.com Page 3