• Keine Ergebnisse gefunden

hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers

N/A
N/A
Protected

Academic year: 2022

Aktie "hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers

Shujun Li1, Ahmad-Reza Sadeghi2 and Roland Schmitz3

1 University of Konstanz, Germany

2 Ruhr-University of Bochum, Germany

3 Stuttgart Media University, Germany

Abstract. We propose hPIN/hTAN, a low-cost token-based e-banking protection scheme when the adversary has full control over the user’s computer. Compared with existing hardware-based solutions, hPIN/hTAN depends on neither second trusted channel, nor secure keypad, nor com- putationally expensive encryption module.

Due to the rapid progress of the Internet, e-banking has become more and more popular all over the world and security is considered as one of the most se- rious issues of e-banking. The earliest and simplest defense protecting e-banking systems is user authentication based on static PINs. Since static PINs are prone to identity theft, two-factor user authentication such as PIN/TAN has been widely adopted to make e-banking more secure. However, PIN/TAN cannot re- sist man-in-the-middle (MitM) attack, whose aim is to manipulate transactions.

In the strongest form of MitM attacks, the user’s computer is under thefullcon- trol of the adversary, who can observe and tamper with all the communications between the user and the e-banking server. The wide spread of malware over the Internet renders such advanced MitM attacks possible in reality.

In this poster, we propose hPIN/hTAN, the first (to the best of our knowl- edge) hardware-based solution against MitC attacks that depends on neither second trusted channel nor secure keyboard nor computationally expensive en- cryption (such as PKC). Instead, hPIN/hTAN bases its security only on proper use of a cryptographic hash function and active involvement of human attention.

The hPIN/hTAN includes two specific protocols – hPIN and hTAN, which protect the login process and online transactions, respectively. The involved par- ties include a human user, a trusted USB-token issued by the bank to the user, an untrusted terminal computer, and the e-banking server. The USB-token is equipped with a trusted display and shares a secret with the server.

The core of the hPIN protocol is a random code shown on the trusted display of the USB-token, which makes it possible for the user to input a transformed PIN on the untrusted computer without leaking the PIN. After the user authen- ticates herself to the USB-token, the hPIN protocol continues to achieve mutual authentication between the USB-token and the server. In the hTAN protocol, the user verifies the transaction datasimultaneously while typing them on the key- board of the untrusted computer. Then the USB-token and the server perform a transaction verification process based on the shared secret.

First publ. in: Financial cryptography and data security : 14th International Conference, FC 2010, Tenerife, Canary Islands, Spain, January 25 - 28, 2010 / Radu Sion (ed.). Berlin : Springer, 2010, p. 429

The original publication is available at www.springerlink.com

Konstanzer Online-Publikations-System (KOPS) URN: http://nbn-resolving.de/urn:nbn:de:bsz:352-opus-126765

URL: http://kops.ub.uni-konstanz.de/volltexte/2010/ 12676

Referenzen

ÄHNLICHE DOKUMENTE

I Über den Zeitpunkt des Empfangs kann keine Aussage getroffen werden (Unbounded indeterminancy). I Über die Reihenfolge der Empfangenen Nachrichten wird im Aktorenmodell keine

Therefore, it could be argued that a deal on the Iranian nuclear programme would not provide a sufficient basis for a change in existing missile defence plans.. So far,

In Theorem 4.4 we prove that for finitely many given points a i of infinite order, the `-parts of their reductions a i,v can be made simultaneously non-trivial on a set of

1950, after treating mice infected with virulent strains with Bayer 7602, observed that these animals were highly resistant to challenge with either homologous or heterologous

Pbtscher (1983) used simultaneous Lagrange multiplier statistics in order to test the parameters of ARMA models; he proved the strong consistency of his procedure

Dellacherie, Capacities e t Processus Sochastiques (Capacities and Sto- chastic Processes), Springer-Verlag, Berlin and New York

[r]

Continue for 24 hours after delivery or the last fit - If seizures recur: Repeat MgSO4 2g IV as per loading dose over 5 - 10 minutes - Monitor: Hourly urine output. Respiratory