Security token


Security token
Several types of security tokens with a penny for scale.
SecurID tokens from RSA Security designed as key fobs.
eToken tokens from Aladdin Knowledge Systems
Token from VeriSign
Yubikey token from Yubico

A security token (or sometimes a hardware token, hardbad token, authentication token, USB token, cryptographic token,[1] or key fob) may be a physical device that an authorized user of computer services is given to ease authentication. The term may also refer to software tokens.

Security tokens are used to prove one's identity electronically (as in the case of a customer trying to access their bank account). The token is used in addition to or in place of a password to prove that the customer is who they claim to be. The token acts like an electronic key to access something.

Some may store cryptographic keys, such as a digital signature, or biometric data, such as fingerprint minutiae. Some designs feature tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generating routine with some display capability to show a generated key number. Special designs include a USB connector, RFID functions or Bluetooth wireless interface to enable transfer of a generated key number sequence to a client system.

Contents

Token types and usage

There are five types of tokens:

  1. Static password.
  2. Synchronous dynamic password
  3. Asynchronous password
  4. Challenge response

This article currently focuses on synchronous dynamic password tokens.

The simplest security tokens do not need any connection to a computer. The client enters the number to a local keyboard as displayed on the token (second security factor), usually along with a PIN (first security factor), when asked to do so. Being disconnected from the authenticating server, however, renders such tokens vulnerable to man-in-the-middle attacks.

Other tokens connect to the computer using wireless techniques, such as Bluetooth. These tokens transfer a key sequence to the local client or to a nearby access point.

Alternatively, another form of token that have been widely available for many years are mobile devices which communicate using an out-of-band channel (like voice, SMS, USSD). Like physically disconnected tokens, out-of-band delivered tokens are also vulnerable to man-in-the-middle attacks.

Still other tokens plug into the computer. For these one must:

  1. Connect the token to the computer using an appropriate input device
  2. Enter the PIN if necessary

Depending on the type of the token, the computer OS will now either

  • read the key from token and perform cryptographic operation on it or
  • ask the token's firmware to perform this operation

Finally, a recent token approach called "virtual tokens" relies on the connection established through normal http/https internet protocols to exchange one-time digitally-signed key and token information with the connected internet device, thus reducing the risks associated with man-in-the-middle attacks while simultaneously reducing support and administration costs typically associated with other token solutions.

A related application is the hardware dongle required by some computer programs to prove ownership of the software. The dongle is placed in an input device and the software accesses the I/O device in question to authorize the use of the software in question.

Minimum requirement

1. Option 1: (for zero installation and excluded tokens): The minimum requirement of any token is at least an inherent unique identity in a protected memory that cannot be tampered with and preferably is not openly accessible to applications other than those offered by the token vendor or another trusted organization.

2. Option 2: (for out of band tokens): The minimum requirement of this form of token is connectivity from another medium like mobile network for USSD, SMS and voice. All you need is a registered telephone / mobile number.

Vulnerabilities

The simplest vulnerability with any password container is losing the special key device or the activated smart phone with the integrated key function. Such vulnerability cannot be healed with any single token container device within the pre-set time span of activation. All further consideration presumes performant loss prevention, e.g. by additional electronic leash or body sensor and alarm.

Physically disconnected token approaches, including out-of-band approaches, are also vulnerable to man-in-the-middle attacks. In a man-in-the-middle attack, a fraudster acts as the "go-between" the user and the legitimate system, soliciting the token value from the user and then supplying it to the authentication system themselves. Since the token value is mathematically correct, the authentication succeeds and the fraudster is granted access. Citibank made headline news in 2006 when its hardware token-equipped business users became the victims of a large Ukranian-based man-in-the-middle phishing attack.

Digital signature

Trusted as a regular hand-written signature, the digital signature must be made with a private key known only to the person authorized to make the signature. Tokens that allow secure on-board generation and storage of private keys enable secure digital signatures, and can also be used for user authentication, as the private key also serves as a proof for the user’s identity.

For tokens to identify the user, all tokens must have some kind of number that is unique. Not all approaches fully qualify as digital signatures according to some national laws.[citation needed] Tokens with no on-board keyboard or another user interface cannot be used in some signing scenarios, such as confirming a bank transaction based on the bank account number that the funds are to be transferred to.

Embodiments and vendors

Tokens can contain chips with functions varying from very simple to very complex, including multiple authentication methods. Commercial solutions are provided by a variety of vendors, each with their own proprietary (and often patented) implementation of variously used security features. Token designs meeting certain security standards are certified as FIPS compliant. Tokens without any kind of certification are sometimes viewed as suspect, as they often do not meet accepted government or industry security standards, have not been put through rigorous testing, and likely cannot provide the same level of cryptographic security as token solutions which have had their designs independently audited by 3rd party agencies.

Disconnected tokens

A disconnected token. The number must be copied into the PASSCODE field by hand.

Disconnected tokens have neither a physical nor logical connection to the client computer. They typically do not require a special input device, and instead use a built-in screen to display the generated authentication data, which the user enters manually themselves via a keyboard or keypad. Disconnected tokens are the most common type of security token used (usually in combination with a password) in two-factor authentication for online identification.[2]

Connected tokens

Connected tokens are tokens that must be physically connected to the client computer. Tokens in this category will automatically transmit the authentication info to the client computer once a physical connection is made, eliminating the need for the user to manually enter the authentication info. However, in order to use a connected token the appropriate input device must be installed. The most common types of physical tokens are smart cards and USB tokens, which require a smart card reader and a USB port respectively.

SmartCards

Many connected tokens use SmartCard technlogy. SmartCards can be very cheap (around ten cents) and contain proven security mechanisms (as used by financial institutions, like cash cards). However, computational performance of SmartCards is often rather limited because of extreme low power consumption and ultra thin form-factor requirements.

Contactless tokens

Contactless tokens are the third main type of physical tokens. Unlike connected tokens, they form a logical connection to the client computer but do not require a physical connection. The absence of the need for physical contact makes them more convenient than both connected and disconnected tokens. As a result contactless tokens are a popular choice for keyless entry systems and electronic payment solutions such as Mobil Speedpass, which uses RFID to transmit authentication info from a keychain token. However, there have been various security concerns raised about RFID tokens after researchers at Johns Hopkins University and RSA Laboratories discovered that RFID tags could be easily cracked and cloned.[3] Another downside is that contactless tokens have relatively short battery lives; usually only 3–5 years, which is low compared to USB tokens which may last up to 10 years.[citation needed] Though some tokens do allow the batteries to be changed, thus reducing costs.

Bluetooth tokens

Bluetooth tokens are often combined with a USB token, thus working in both a connected and a disconnected state. Bluetooth authentication works when closer than 32 feet (10 meters). If the Bluetooth is not available, the token must be inserted into a USB input device to function.

In the USB mode of operation sign off required care for the token while mechanically coupled to the USB plug. The advantage with the Bluetooth mode of operation is the option of combining sign-off with a distance metrics. Respective products are in preparation, following the concepts of electronic leash.

GSM cellular phones

A new category of T-FA tools allows users to utilize their mobile phone as a security token. A Java application installed on the mobile phone performs the functions normally provided by a dedicated token. Other methods of using the cell phone include using SMS messaging, instigating an interactive telephone call, or using standard Internet protocols such as HTTP or HTTPS.

Such a method can simplify deployment, reduce logistical costs and remove the need for separate token devices.[4] In the case of SMS options, there are trade-offs: users may incur fees for text messages or for WAP/HTTP services.

Single sign-on software tokens

Some types of Single sign-on (SSO) solutions, like enterprise single sign-on, use the token to store software that allows for seamless authentication and password filling. As the passwords are stored on the token, users need not remember their passwords and therefore can select more secure passwords, or have more secure passwords assigned.

Virtual Tokens

Virtual tokens are a new concept in multi-factor authentication first introduced in 2005 by the security company Sestus. Virtual tokens transmit one-time-use digitally-signed key and token information using internet-standard http/https delivery methods, reducing the costs normally associated with implementation and maintenance of multi-factor solutions. Virtual tokens utilize the user's existing internet device as the "something the user has" factor. Since the user's internet device is communicating directly with the authenticating website, the solution does not suffer from man-in-the-middle attacks and other forms of online fraud. Virtual tokens are fundamentally different than 'soft (software) tokens'. Unlike soft tokens, virtual tokens deploy no software to the user, thus reducing support requirements and interoperability issues.

Related authentication technologies

Two-factor authentication (T-FA or 2FA)

Security tokens provide the "what you have" component in two-factor authentication and multi-factor authentication solutions. Some tokens provide up to three factors of authentication,[5] or allow you to combine different factors to create multifactor authentication[6]

One-time passwords

A one-time password is a password that changes after each login, or changes after a set time interval.

Mathematical-algorithm-based one-time passwords

Another type of one-time password uses a complex mathematical algorithm, such as a hash chain, to generate a series of one-time passwords from a secret shared key. Each password is unguessable, even when previous passwords are known. The open source OATH algorithm is standardized; other algorithms are covered by U.S. patents. Each new password is unique, so an unauthorized user would be unable to guess what the new password may be, based on previously used passwords.

Aladdin Knowledge Systems’ eToken NG-OTP
The Aladdin Knowledge Systems' eToken NG-OTP is a hybrid USB and one-time password token. It combines the functionality of smart card based authentication tokens with one-time password user authentication technology in detached mode.
Deepnet Security
Deepnet Security's Deepnet Unified Authentication Platform is a multi-factor authentication platform for provisioning, managing and verifying all types of user and host authentication methods, form-factors and user credentials, including OTP tokens, PKI certificates, biometrics and device DNA.
Duo Security
Duo Security's D-100 hardware tokens employ the OATH standard for OTP generation, in addition to its mobile soft tokens, voice callback, SMS, and Duo Push authentication methods.
RCDevs OpenOTP Tokens
The OpenOTP authentication platform developed by RCDevs uses OATH Tokens (Time-based, Event-based and Challenge-Response), YubiKey, mOTP soft Tokens, SMS Tokens and the Google Authenticator (with QRCode user Token provisioning).
Swekey
The Swekey, manufactured by Musbe, Inc. is an USB device that provides secure authentication for web sites using a one-time password algorithm. The device presence and authentication can be controlled by web sites using JavaScript.
VeriSign
VeriSign Identity Protection credentials employ the OATH standard. VeriSign eToken is OEM from Aladdin Knowledge Systems.
Yubico YubiKey
The YubiKey, manufactured by Yubico, is a device that acts as a USB keyboard and provides secure authentication by a one-time password that is encrypted using the AES encryption algorithm with a 128-bit key.The Yubikey has four modes of operation including Standard Yubico 12 character ID + 32 character OTP, OATH 6 or 8 digit OTP for use with third party OATH servers, Static pass code including 1-64 character for legacy login applications, and challenge-response functionality using client software.

Time-synchronized one-time passwords

Time-synchronized one-time passwords change constantly at a set time interval, e.g. once per minute. To do this some sort of synchronization must exist between the client's token and the authentication server. For disconnected tokens this time-synchronization is done before the token is distributed to the client. Other token types do the synchronization when the token is inserted into an input device. The main problem with time-synchronized tokens is that they can, over time, become unsynchronized.[citation needed] However, some such systems, such as RSA's SecurID, allow the user to resynchronize the server with the token, sometimes by entering several consecutive passcodes. Most also cannot have replaceable batteries and only last up to 5 years before having to be replaced - so there is additional cost.

Aradiom SolidPass
SolidPass, developed by Aradiom, is a mobile Java phone based security token that provides a time-based one-time password algorithm for secure authentication, and also offers challenge response based signing including transaction signing and additional security question.
BRToken SafeSIGNATURE
SafeSIGNATURE token, developed by the Brazilian company BRToken, was one of the first to provide support for the TOTP algorithm, defined by the OATH (Initiative For Open Authentication), an extension of the HOTP algorithm, but time-based. It also has the capacity of reading transaction data from any type of screen or projection, displaying in the token screen, and generating an Electronic signature, based on the public OCRA algorithm.
CAT (Cellular Authentication Token)
The CAT token, developed by the New Zealand company Mega AS Consulting Ltd, was the first to market a Cellular Java ME based soft token. The CAT uses an OATH compliant time-based one-time password (TOTP) algorithm for strong authentication, and also offers encrypted messaging and encrypted documents delivery system. The CAT is a multi tokens management system. Using a unique process, the CAT is secured on the Cellular device (or PDA, BlackBerry, Windows OS).
Entrust IdentityGuard Mini Token
Entrust offers two variants of their OTP token — Entrust IdentityGuard Mini Token OT and Mini Token AT. The Entrust IdentityGuard Mini Token OT provides time-based, one-time passwords using the standards-based TOTP algorithm, endorsed by the Initiative for Open Authentication (OATH), providing compatibility with third-party software. The Entrust IdentityGuard Mini Token AT offers time- and event-synchronous, one-time passwords based on the stronger DES/Triple DES algorithm.
Event-based token
An event based token, by its nature, has a longer life span.[citation needed] They work on the one-time password principle and so once used, the next password is generated. Often the user has a button to press to receive this new code via either a token or via an SMS message. All CRYPTOCard's tokens are event-based rather than time-based.
Identita Technologies Display OTP Card
Identita's LED or EINK display OTP cards display a number which changes each time the button on the card is pressed. This one-time password along with a PIN when authenticating allows for successful identication of the end user. Since Identita's OTP Display cards are almost always asleep except during activation, the engineering team at Identita designed an algorithm which allowed for accurate OTP generation without requiring the clock on the card and the clock on the authentication server to be matched. Identita's time-based OTP generation is patent pending.
KerPass UST
KerPass provide time synchronous OATH one time passwords on mobile phone. A new password is generated every 30 seconds. KerPass uses an exclusive server side password validation technology that makes possible using a KerPass password in the context of zero knowledge password proof algorithm like SPEKE or SRP. This combination renders password authentication insensitive to man in the middle attacks.
NagraID Security Touch Display Card
The NagraID Security 306 Series Touch Display Card is a 6-digit Powered Display Card credential providing strong security with integrated 12-button touch keypad packaged in a familiar and convenient Credit card form factor. The innovative touch keypad supports various onboard applications such as PIN activation, challenge response and access to critical applications. The 306 Series card can function as a One Time Password credential, physical access device, PKI or dotNET Chip card, contactless eWallet and/or payment device. The cards are available with MasterCard's CAP, OATH and customer specific algorithms (time-based or event-based).[7]
RSA Security's SecurID
RSA Security's SecurID displays a number which changes at a set interval. The client enters the one-time password along with a PIN when authenticating. US patented technology.
SecureMetric's SecureOTP
SecureMetric's SecureOTP Time offers OATH Compliant Time Based One-Time-Password that where the security cryptography is synchronized base on the token’s real time clock and the server time. Simply press the button and SecureOTP Time will display a secure One-Time-Password which is generated base on the current time and the initiated secret key. The One-Time-Password will be changed after every 60 seconds, such short validity of the One-Time-Password will prevent someone who "steal" the password can perform any harmful activities after the valid interval. SecureMetric's SecureOTP Event offers OATH Compliant Event Based token. This method is where the security cryptography is base on an incremented sequence number when each time a user press the token’s button, as the input value and combine together with the initiated secret key inside the token in order to generate the require One-Time-Password. Event based One-Time-Password will have no expiry which tend to be more convenient to users who prefer great user friendliness.
Secure Computing's Safeword
Secure Computing's Safeword is a hardware device that will display a passcode when pressing a button on the device. A barcode and serial number on the back of the device are used by administrators to synchronize the devices with the authentication system. The Safeword system can be event-based or time-based. Each press of the button will display a new passcode and once a passcode is used for authentication, combined with the user's PIN, it and all the passcodes generated before it can not be reused again. Time-based tokens display different tokens every 20 seconds or less depending on the configuration.
SecuTech UniOTP Tokens
The UniOTP, manufactured by SecuTech[8],compliant with OATH standard for OTP generation. UniOTP series has 3 diffenent models, which support different one-time-password generation mechanism, including time-based, event-based and challenge/response-based to provide two-factor authentication. The time-based OTP token has a real-time clock inside which is synchromized to the authentication server, the one-time-password will be changed every 60 seconds. The succesfully authenticated users must provide the right password and the one-time-password generated by UniOTP device.
Smart DisplayCard
The Smart DisplayCard by ActivIdentity is a combination security token and smart card. A single button on the card displays a one time password on a small liquid crystal display when pressed. This device uses an OATH compliant event-based algorithm to generate OTPs. The embedded smart chip provides standard smart card PKI capabilities; typically email encryption and digital signatures. The display card portion of the product is produced by NagraID.
Vasco's DigiPass
VASCO's Digipass series have either a small keyboard where the user can enter a PIN or either a single button, in addition it generates a new one-time password after a pre-set time and some features are patented.[9][10]

PC cards

The PC card tokens are made to only work with laptops. Type II PC Cards are preferred as a token as they are half as thick as Type III.

Mykotronx Corp.
Mykotronx Corp. (a division of SafeNet) makes the Fortezza card token for laptops with a PC card.

Smart cards

Smart cards are relatively inexpensive compared to other tokens.[citation needed] There are also significant wear-and-tear on the smart cards themselves because of the friction on the electronic contacts the card is inserted. This has the potential to reduce the lifespan of a smart card token.

Universal Serial Bus (USB)

The Universal Serial Bus has become a standard in computers today, USB tokens are therefore often a cheaper alternative than other tokens needing a special input device.[citation needed]

VeriSign

VeriSign offers several different token types, from security cards to voice passcodes, as part of their Unified Authentication services.[11][12] A custom-branded version of their One-Time Password (OTP) Token is used by PayPal and eBay as an extra layer of authentication for consumers when logging in to their websites.[13]

Smart-card-based USB tokens

Smart-card-based USB tokens which contain a smart card chip inside provide the functionality of both USB tokens and smart cards. They enable a broad range of security solutions and provide the abilities and security of a traditional smart card without requiring a unique input device. From the computer operating system's point of view such a token is a USB-connected smart card reader with one non-removable smart card present.[14] Some these tokens are also made to support the NIST standard for Personal Identity Verification (PIV).[15]

Other token types

Some use a special purpose interface (e.g. the crypto ignition key deployed by the United States National Security Agency). Tokens can also be used as a photo ID card. Cell phones and PDAs can also serve as security tokens with proper programming.

See also

References

  1. ^ PKCS -- The RSA standards PKCS#11 and PKCS #15 define software interfaces.
  2. ^ de Borde, Duncan (2007-06-28). "Two-factor authentication". Siemens Insight Consulting. http://www.insight.co.uk/files/whitepapers/Two-factor%20authentication%20(White%20paper).pdf. Retrieved 2009-01-14. 
  3. ^ Biba, Erin (2005-02-14). "Does Your Car Key Pose a Security Risk?". PC World. http://www.pcworld.com/article/119661/does_your_car_key_pose_a_security_risk.html. Retrieved 2009-01-14. 
  4. ^ http://www.fireid.com/products/overview.html
  5. ^ "GoldKey USB Security Token". goldkey.com. http://www.goldkey.com/SmartCard/usb-security-token.html. Retrieved 2008-10-29. 
  6. ^ "TrustAlert's RESEPT". TrustAlert. http://www.trustalert.com. Retrieved 2010-01-22. 
  7. ^ NagraID Security Display Cards, nidsecurity.com
  8. ^ a information security vendor based on hardware technology
  9. ^ US patent 4599489, Cargile, William P., "Solid state key for controlling access to computer software", issued 1986-07-08, assigned to Gordian Systems Inc. 
  10. ^ US patent 4609777, Cargile, William P., "Solid state key for controlling access to computer software", issued 1986-09-02, assigned to Gordian Systems Inc. 
  11. ^ Photos of Verisign Tokens, hitrust.com.hk (retrieved 15 Aug 2008)
  12. ^ Two Factor Authentication Credentials, verisign.com (retrieved 15 Aug 2008)
  13. ^ PayPal Security Key, paypal.com (retrieved 15 Aug 2008)
  14. ^ Specification for Integrated Circuit(s) Cards Interface Devices, usb.org
  15. ^ PIV Smart Card Token, GoldKey
General references

External links


Wikimedia Foundation. 2010.