SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Design Methodologies for building a Robust
       Whitepaper
                                  Two Factor Authentication System

                                  During March 2011, market Leader in Authentication product announced
                                  that an Advanced Persistent Threat (APT) attack has happened ‘specifically
                                  related to their two-factor authentication product”. This led to loss of
                                  millions of dollars to the customers & vendor. It has also resulted in
Common Design Pitfalls in
                                  replacement of authentication products in multiple government
building Two Factor               organizations and enterprises. This kind of APT attack can potentially
Authentication Systems:           compromise the following elements of an Authentication System:
                                  1.     Records of seeds used in tokens
- One of the factors in 2FA
                                  2.     Relationship of those seeds to specific token serial numbers
system typically “What User
                                  3.     Relationship of seeds or token serial numbers to specific clients
Knows” is not strong enough
                                  4.     Information regarding algorithm that could expose mathematical and
and becomes the Weakest           cryptographic weaknesses
Link in case of potential         5.     Information regarding specific implementations of the algorithm that
compromise scenario.              may reveal implementation weaknesses

- No Strong coupling between
                                  Even if any one of the above happens, the whole authentication mechanism
the two factors of the 2FA
                                  can be circumvented and will help attackers to compromise the whole
System.                           system.
- Storing of User Sensitive
                                  Design Guidelines to provide protection against APT attacks
information with the product
vendor at central location        To avoid the kind of APT attack that happened recently, the authentication
                                  systems should be designed and developed to survive any compromises that
- In case of future
                                  happen to Product Vendor itself in future. Following are the design
compromise of authentication      considerations to be taken into account when designing an Authentication
system, inability to seamlessly   System.
transition to alternative
methods
                                  1. Not storing records of seeds used in tokens at central location:
- High dependency on
Algorithms which is used for      Product Vendors should not hold/posses the seeds information of the
authentication.                   tokens/hardware device it delivers (the device which is supposed to act as
                                  one of the factors of Two Factor authentication System). The best way is to
                                  avoid the storage of User Specific Seeds totally at a central location that can
                                  be potentially compromised in future. Use of challenge-response based
                                  system (where the user provides the response to the challenge based on
                                  something he knows and something he has) instead of time synchronized
                                  system may avoid the need of storing user specific sensitive information at
                                  central location.
Designing a Robust Two Factor Authentication Product - Whitepaper




                               2. Not storing any relationship information between seeds and
                               token serial numbers:

                               Storing the mapping between the seeds and serial numbers of the tokens
Impact of recent APT attacks   should be avoided, as it leads to easily access the sensitive information of the
on Vendor’s Two Factor         token (which is something the user has as part of two factor authentication).
Authentication Product:        The information stored about hardware should be random and should not
                               reveal the specific sensitive details about the hardware possessed by the
- Attack on Lockheed Martin—
                               user. And moreover the information stored should be encrypted using
the largest U.S. military      strongest encryption algorithms like “AES (Advanced Encryption Standard”)
contractor                     and “Triple DES”.
- L-3 Communications has
discovered a breach due to     3. Using multiple algorithms for added strength:
cloned tokens
                               Using a specific algorithm with the pre-set seed values for all the clients
- Many contractors including   could expose the mathematical and cryptographic weakness of the system
Northrop Grumman, has          once the algorithm is exposed and the seed value database is compromised.
                               So, instead of having one algorithm it is better to have variant of algorithms
disabled tokens as a
                               that solve the same purpose and different customers should be given with
precautionary method in wake
                               different algorithms. So the vulnerabilities in one algorithm may affect only
of APT attack that happened
                               small set of customers and the algorithms can be replaceable immediately as
on product vendor              an upgrade if the customer feels that his system has been compromised.


                               4. Leveraging multiple initialization vectors known only to
                               Customer:

                               The strength of the authentication system should not only come from the
                               algorithm or the robust implementation of the system. It should also posses
                               the capability of taking initialization vectors for the algorithm that’s been
                               implemented. The customers should be given the authority to initialize the
                               system with a set of random values of their wish and should not be known
                               even to the authentication product vendor. In this way, even if the source
                               code exposes the implementation weakness of the system, it does not create
                               vulnerability, as each customer poses different initialization vectors which
                               are proprietary to them.




                                                                                                        Page 2
Designing a Robust Two Factor Authentication Product - Whitepaper




Conclusion

By following above design methodologies, a two factor authentication
system can be made more robust against the kind of APT attacks that has
been witnessed recently. ArrayShield’s IDAS Two-factor Challenge-response
based authentication product is developed by following the design
methodologies as explained above; which makes it one of the most secure
Authentication Systems available in the market.




                                         ABOUT ARRAYSHIELD
Array Shield Technologies is the maker of software security products in the
area of Multi-Factor Authentication. The company’s mission is to provide
highly secure, cost effective and easy to use software security solutions
globally.

For more information, visit us at www.arrayshield.com




                                                                       Page 3

Weitere ähnliche Inhalte

Mehr von ArrayShield Technologies Private Limited (7)

PCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield ProductPCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield Product
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Problems with biometric authentication
Problems with biometric authenticationProblems with biometric authentication
Problems with biometric authentication
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
 
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Building a Robust Two Factor Authentication System

  • 1. Design Methodologies for building a Robust Whitepaper Two Factor Authentication System During March 2011, market Leader in Authentication product announced that an Advanced Persistent Threat (APT) attack has happened ‘specifically related to their two-factor authentication product”. This led to loss of millions of dollars to the customers & vendor. It has also resulted in Common Design Pitfalls in replacement of authentication products in multiple government building Two Factor organizations and enterprises. This kind of APT attack can potentially Authentication Systems: compromise the following elements of an Authentication System: 1. Records of seeds used in tokens - One of the factors in 2FA 2. Relationship of those seeds to specific token serial numbers system typically “What User 3. Relationship of seeds or token serial numbers to specific clients Knows” is not strong enough 4. Information regarding algorithm that could expose mathematical and and becomes the Weakest cryptographic weaknesses Link in case of potential 5. Information regarding specific implementations of the algorithm that compromise scenario. may reveal implementation weaknesses - No Strong coupling between Even if any one of the above happens, the whole authentication mechanism the two factors of the 2FA can be circumvented and will help attackers to compromise the whole System. system. - Storing of User Sensitive Design Guidelines to provide protection against APT attacks information with the product vendor at central location To avoid the kind of APT attack that happened recently, the authentication systems should be designed and developed to survive any compromises that - In case of future happen to Product Vendor itself in future. Following are the design compromise of authentication considerations to be taken into account when designing an Authentication system, inability to seamlessly System. transition to alternative methods 1. Not storing records of seeds used in tokens at central location: - High dependency on Algorithms which is used for Product Vendors should not hold/posses the seeds information of the authentication. tokens/hardware device it delivers (the device which is supposed to act as one of the factors of Two Factor authentication System). The best way is to avoid the storage of User Specific Seeds totally at a central location that can be potentially compromised in future. Use of challenge-response based system (where the user provides the response to the challenge based on something he knows and something he has) instead of time synchronized system may avoid the need of storing user specific sensitive information at central location.
  • 2. Designing a Robust Two Factor Authentication Product - Whitepaper 2. Not storing any relationship information between seeds and token serial numbers: Storing the mapping between the seeds and serial numbers of the tokens Impact of recent APT attacks should be avoided, as it leads to easily access the sensitive information of the on Vendor’s Two Factor token (which is something the user has as part of two factor authentication). Authentication Product: The information stored about hardware should be random and should not reveal the specific sensitive details about the hardware possessed by the - Attack on Lockheed Martin— user. And moreover the information stored should be encrypted using the largest U.S. military strongest encryption algorithms like “AES (Advanced Encryption Standard”) contractor and “Triple DES”. - L-3 Communications has discovered a breach due to 3. Using multiple algorithms for added strength: cloned tokens Using a specific algorithm with the pre-set seed values for all the clients - Many contractors including could expose the mathematical and cryptographic weakness of the system Northrop Grumman, has once the algorithm is exposed and the seed value database is compromised. So, instead of having one algorithm it is better to have variant of algorithms disabled tokens as a that solve the same purpose and different customers should be given with precautionary method in wake different algorithms. So the vulnerabilities in one algorithm may affect only of APT attack that happened small set of customers and the algorithms can be replaceable immediately as on product vendor an upgrade if the customer feels that his system has been compromised. 4. Leveraging multiple initialization vectors known only to Customer: The strength of the authentication system should not only come from the algorithm or the robust implementation of the system. It should also posses the capability of taking initialization vectors for the algorithm that’s been implemented. The customers should be given the authority to initialize the system with a set of random values of their wish and should not be known even to the authentication product vendor. In this way, even if the source code exposes the implementation weakness of the system, it does not create vulnerability, as each customer poses different initialization vectors which are proprietary to them. Page 2
  • 3. Designing a Robust Two Factor Authentication Product - Whitepaper Conclusion By following above design methodologies, a two factor authentication system can be made more robust against the kind of APT attacks that has been witnessed recently. ArrayShield’s IDAS Two-factor Challenge-response based authentication product is developed by following the design methodologies as explained above; which makes it one of the most secure Authentication Systems available in the market. ABOUT ARRAYSHIELD Array Shield Technologies is the maker of software security products in the area of Multi-Factor Authentication. The company’s mission is to provide highly secure, cost effective and easy to use software security solutions globally. For more information, visit us at www.arrayshield.com Page 3