SlideShare a Scribd company logo
1 of 29
Two Factor Authentication
Submitted by:
Dilip Kumar Jangir
Roll No.:12EARIT019
Submitted to:
Er. Amit Kumar Nayak
Index
1. Authentication
2. Authentication Factors
• Need of 2FA
• OTP3. 2 Factor Authentication
4. 2FA Using OTP Hard Tokens
5. 2FA Using Mobile Tokens
6. Response Mechanism
7. Business Benefits
8. Conclusion & Recommendations
Authentication
Authentication
• Authentication is the process of verifying the
identity of user.
• The most common technique to authenticate
a user is to use username and password.
Authentication Factors
Authentication Factors
Something you know
Something you have
Something you are
Two Factor Authentication
Two Factor Authentication
• It is an approach to authentication which
requires the presentation of two different
kinds of evidence that someone is who they
say they are.
Need of 2FA
• Social Engineering
• Phishing
• Brute Force Attacks
• Shoulder Surfing
• Keystroke Logging
• Eavesdropping
• Dictionary Attacks
OTP
Software – OTP
An one-time password (OTP) generated by
the company and sent to your mobile
phone or PC.
Hardware – OTP
An OTP generated by a security
device/token. You press the button on the
security device/token to obtain the OTP.
Event Based OTP
Here the moving factor is triggered by an
event
Time Based OTP
Here the moving factor is time.
OTP is a second layer of
security to verify your
identity.
2FA Using Hard Tokens
2F Using Hard Tokens
• Hardware token is a key fob which is typically
carried on your key ring and displays a
pseudo-random number that changes
periodically.
2F Using Hard Tokens cont…
Security Analysis
Benefits
 It is secure against packet
replay attacks.
 It prevents against
phishing.
 Threats
 User needs to carry the
device everywhere, and
there is a risk that it may
get stolen or lost.
 Cost is very high.
 Vulnerable to active
attacks and Man in the
middle attacks

2FA Using Mobile Tokens
2FA Using Mobile Tokens
• This moves the second factor to ‘something
you are’ or ‘something about your behaviour’.
• It makes use of:
– Application installed on user’s mobile
– IMEI
– Time Stamp
– Seed
• Time based One Time Password Algorithm is
used.
How Mobile Token 2FA Works?
•Seed
•Pin
•IMEI number
•Time Stamp
difference
Mobile
Application
Mobile
Application
Auth Server
• User Registration on server
How Mobile Token 2FA Works?
Same Seed
Algorithm
Time
Seed
Algorithm
Time
Seed
159759 159759
Same Time
Same OTP
Mobile
Application
Authentication
Server
• OTP Generation:
Security Analysis
Benefits
 A relatively cheaper and
flexible means of OTP.
 User just need to carry
their mobiles with them,
no extra device is needed.
 Threats
 Still vulnerable to
active attacks
 Man in the middle
attacks
 Man in the browser
attacks

Response Mechanism
Response Mechanism
• For fund transfer
transactions, the server
generates a code and
sends to the user. The user
enters the code provided
to the Internet banking site
in order to commit the
transaction. Challenges:
•High Cost required
•Hardware required
SMS with Transaction Details
Security Analysis
• Threat
– Mobile is now single point of failure. OTP is
generated/ received on mobile and the
verification code of transaction is also received via
sms on mobile. If attacker has the possession of
user’s mobile, then he can do everything.
• Recommendation
– It is necessary that a different medium is used for
receiving OTP and receiving transaction
verification code.
Business Benefits
Business Benefits…
Customer
Confidence
Regulations &
Best Practices
EFT ACT
2007
PCI DSS
NIST
Threat
Prevention
Phishing and
Packet Replay
and Man in
the middle
attacks
Fraud
Prevention
Conclusion &
Recommendations
Recommendations…
• User should check and make sure the website has
https in the URL, so that the password goes
encrypted while transmission.
• The OTP and PIN should be hashed before
sending.
• Mutual authentication should be established
between the client and the server before the
session starts to ensure the user that server can
be trusted.
• Using split key technique for authentication.
Conclusion says…
Method Threats Effective Against Man in
the Browser attack?
Static Passwords Can be lost and easily
obtained
Brute force attacks
possible
No
Biometric No
OTP Hard Tokens User has to carry the
token
No
OTP Soft/ Mobile Token Man in the middle attacks No
OTP with Signature
(Challenge Response)
Secure against man in the
middle attacks
Yes, but inconvenient
OTP with SMS Transaction
Detail
Secure against Phishing,
Packet Replay, MIM and
MITM
Yes!!
Thank You

More Related Content

What's hot

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)securityEnrico Zimuel
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Password Management
Password ManagementPassword Management
Password ManagementRick Chin
 

What's hot (20)

Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Digital Certificate
Digital CertificateDigital Certificate
Digital Certificate
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Password management
Password managementPassword management
Password management
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Password Management
Password ManagementPassword Management
Password Management
 

Viewers also liked

Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactSalesforce Admins
 
Simple Two Factor Authentication
Simple Two Factor AuthenticationSimple Two Factor Authentication
Simple Two Factor AuthenticationJohn Congdon
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Managementjeremysbrown
 
Ing voice biometrics nuance
Ing voice biometrics nuanceIng voice biometrics nuance
Ing voice biometrics nuanceRadu Dumitru
 
"2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre...
"2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre..."2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre...
"2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre...Yandex
 
Google Authenticator, possible attacks and prevention
Google Authenticator, possible attacks and preventionGoogle Authenticator, possible attacks and prevention
Google Authenticator, possible attacks and preventionBoštjan Cigan
 
Jasig Central Authentication Service in Ten Minutes
Jasig Central Authentication Service in Ten MinutesJasig Central Authentication Service in Ten Minutes
Jasig Central Authentication Service in Ten MinutesAndrew Petro
 
2013.devcon3 liferay and google authenticator integration rafik_harabi
2013.devcon3 liferay and google authenticator integration rafik_harabi2013.devcon3 liferay and google authenticator integration rafik_harabi
2013.devcon3 liferay and google authenticator integration rafik_harabiRafik HARABI
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)Artur Barseghyan
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and YouChris Stone
 
Voice Biometrics - how to recognize a speaker.
Voice Biometrics - how to recognize a speaker.Voice Biometrics - how to recognize a speaker.
Voice Biometrics - how to recognize a speaker.Tomasz Zietek
 
API Management Part 1 - An Introduction to Azure API Management
API Management Part 1 - An Introduction to Azure API ManagementAPI Management Part 1 - An Introduction to Azure API Management
API Management Part 1 - An Introduction to Azure API ManagementBizTalk360
 
Securing Your Salesforce Deployment with Two Factor Authentication
Securing Your Salesforce Deployment with Two Factor AuthenticationSecuring Your Salesforce Deployment with Two Factor Authentication
Securing Your Salesforce Deployment with Two Factor AuthenticationSalesforce Developers
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) SpecificationCIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) SpecificationCloudIDSummit
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
 
FIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & TutorialFIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & TutorialFIDO Alliance
 

Viewers also liked (20)

Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Simple Two Factor Authentication
Simple Two Factor AuthenticationSimple Two Factor Authentication
Simple Two Factor Authentication
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
 
Ing voice biometrics nuance
Ing voice biometrics nuanceIng voice biometrics nuance
Ing voice biometrics nuance
 
"2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre...
"2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre..."2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre...
"2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre...
 
Google Authenticator, possible attacks and prevention
Google Authenticator, possible attacks and preventionGoogle Authenticator, possible attacks and prevention
Google Authenticator, possible attacks and prevention
 
Jasig Central Authentication Service in Ten Minutes
Jasig Central Authentication Service in Ten MinutesJasig Central Authentication Service in Ten Minutes
Jasig Central Authentication Service in Ten Minutes
 
2013.devcon3 liferay and google authenticator integration rafik_harabi
2013.devcon3 liferay and google authenticator integration rafik_harabi2013.devcon3 liferay and google authenticator integration rafik_harabi
2013.devcon3 liferay and google authenticator integration rafik_harabi
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and You
 
Voice Biometrics - how to recognize a speaker.
Voice Biometrics - how to recognize a speaker.Voice Biometrics - how to recognize a speaker.
Voice Biometrics - how to recognize a speaker.
 
API Management Part 1 - An Introduction to Azure API Management
API Management Part 1 - An Introduction to Azure API ManagementAPI Management Part 1 - An Introduction to Azure API Management
API Management Part 1 - An Introduction to Azure API Management
 
Securing Your Salesforce Deployment with Two Factor Authentication
Securing Your Salesforce Deployment with Two Factor AuthenticationSecuring Your Salesforce Deployment with Two Factor Authentication
Securing Your Salesforce Deployment with Two Factor Authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) SpecificationCIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
FIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & TutorialFIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & Tutorial
 

Similar to Seminar-Two Factor Authentication

Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptxArpithaShoby
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
What is Zero Trust Cybersecurity?
What is Zero Trust Cybersecurity?What is Zero Trust Cybersecurity?
What is Zero Trust Cybersecurity?Metaorange
 
What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?Caroline Johnson
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Core Security
 
Security human
Security humanSecurity human
Security humanJisc
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goMichael Furman
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor AuthenticationPing Identity
 

Similar to Seminar-Two Factor Authentication (20)

Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptx
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
120 i143
120 i143120 i143
120 i143
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
What is Zero Trust Cybersecurity?
What is Zero Trust Cybersecurity?What is Zero Trust Cybersecurity?
What is Zero Trust Cybersecurity?
 
What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
3 steps security
3 steps security3 steps security
3 steps security
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Security human
Security humanSecurity human
Security human
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 

Seminar-Two Factor Authentication

  • 1. Two Factor Authentication Submitted by: Dilip Kumar Jangir Roll No.:12EARIT019 Submitted to: Er. Amit Kumar Nayak
  • 2. Index 1. Authentication 2. Authentication Factors • Need of 2FA • OTP3. 2 Factor Authentication 4. 2FA Using OTP Hard Tokens 5. 2FA Using Mobile Tokens 6. Response Mechanism 7. Business Benefits 8. Conclusion & Recommendations
  • 4. Authentication • Authentication is the process of verifying the identity of user. • The most common technique to authenticate a user is to use username and password.
  • 6. Authentication Factors Something you know Something you have Something you are
  • 8. Two Factor Authentication • It is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are.
  • 9. Need of 2FA • Social Engineering • Phishing • Brute Force Attacks • Shoulder Surfing • Keystroke Logging • Eavesdropping • Dictionary Attacks
  • 10. OTP Software – OTP An one-time password (OTP) generated by the company and sent to your mobile phone or PC. Hardware – OTP An OTP generated by a security device/token. You press the button on the security device/token to obtain the OTP. Event Based OTP Here the moving factor is triggered by an event Time Based OTP Here the moving factor is time. OTP is a second layer of security to verify your identity.
  • 11. 2FA Using Hard Tokens
  • 12. 2F Using Hard Tokens • Hardware token is a key fob which is typically carried on your key ring and displays a pseudo-random number that changes periodically.
  • 13. 2F Using Hard Tokens cont…
  • 14. Security Analysis Benefits  It is secure against packet replay attacks.  It prevents against phishing.  Threats  User needs to carry the device everywhere, and there is a risk that it may get stolen or lost.  Cost is very high.  Vulnerable to active attacks and Man in the middle attacks 
  • 16. 2FA Using Mobile Tokens • This moves the second factor to ‘something you are’ or ‘something about your behaviour’. • It makes use of: – Application installed on user’s mobile – IMEI – Time Stamp – Seed • Time based One Time Password Algorithm is used.
  • 17. How Mobile Token 2FA Works? •Seed •Pin •IMEI number •Time Stamp difference Mobile Application Mobile Application Auth Server • User Registration on server
  • 18. How Mobile Token 2FA Works? Same Seed Algorithm Time Seed Algorithm Time Seed 159759 159759 Same Time Same OTP Mobile Application Authentication Server • OTP Generation:
  • 19. Security Analysis Benefits  A relatively cheaper and flexible means of OTP.  User just need to carry their mobiles with them, no extra device is needed.  Threats  Still vulnerable to active attacks  Man in the middle attacks  Man in the browser attacks 
  • 21. Response Mechanism • For fund transfer transactions, the server generates a code and sends to the user. The user enters the code provided to the Internet banking site in order to commit the transaction. Challenges: •High Cost required •Hardware required
  • 23. Security Analysis • Threat – Mobile is now single point of failure. OTP is generated/ received on mobile and the verification code of transaction is also received via sms on mobile. If attacker has the possession of user’s mobile, then he can do everything. • Recommendation – It is necessary that a different medium is used for receiving OTP and receiving transaction verification code.
  • 25. Business Benefits… Customer Confidence Regulations & Best Practices EFT ACT 2007 PCI DSS NIST Threat Prevention Phishing and Packet Replay and Man in the middle attacks Fraud Prevention
  • 27. Recommendations… • User should check and make sure the website has https in the URL, so that the password goes encrypted while transmission. • The OTP and PIN should be hashed before sending. • Mutual authentication should be established between the client and the server before the session starts to ensure the user that server can be trusted. • Using split key technique for authentication.
  • 28. Conclusion says… Method Threats Effective Against Man in the Browser attack? Static Passwords Can be lost and easily obtained Brute force attacks possible No Biometric No OTP Hard Tokens User has to carry the token No OTP Soft/ Mobile Token Man in the middle attacks No OTP with Signature (Challenge Response) Secure against man in the middle attacks Yes, but inconvenient OTP with SMS Transaction Detail Secure against Phishing, Packet Replay, MIM and MITM Yes!!