Preview

Visual Code Authentication Schemes

Powerful Essays
Open Document
Open Document
7714 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Visual Code Authentication Schemes
I bought a new security token and all I got was this lousy phish—
Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano
{graeme.jenkinson, max.spencer, chris.warrington, frank.stajano}@cl.cam.ac.uk University of Cambridge Computer Laboratory, Cambridge, UK

Abstract. One recent thread of academic and commercial research into web authentication has focused on schemes where users scan a visual code with their smartphone, which is a convenient alternative to passwordbased login. We find that many schemes in the literature (including, previously, our own) are, unfortunately, vulnerable to relay attacks. We explain the inherent reasons for this vulnerability and offer an architectural fix, evaluating its trade-offs and discussing why it has never been proposed by other authors.

1

Introduction

We consider a relatively new class of web authentication schemes, currently attracting significant academic and commercial interest, which we refer to as visual code authentication schemes. A user may log into a website which supports such an authentication scheme by scanning a visual code, such as a Quick Response
(QR) code [1], using their hand-held authenticator device, henceforth scanner.
The scanner is generally a smartphone, but might be a dedicated hardware gadget. The user carries their scanner at all times, or at least whenever they might want to authenticate to a website; the scanner may have a mechanism to prevent its misuse if lost or stolen. Our own Pico system [2] is of course in this class too.
Such schemes are interesting because they have some important usability benefits which passwords do not; specifically, there is nothing for users to remember or type1 . Furthermore these schemes are resilient to conventional phishing2 because the long-term secrets never leave the scanner and so an attacker cannot trick the victim into revealing them. However, visual code authentication schemes present a new risk.



References: techniques—QR Code 2005 bar code symbology specification. ISO 18004:2006, International Organization for Standardization, Geneva, Switzerland (2006) 11, Berlin, Heidelberg, Springer-Verlag (2011) 49–81 In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. SP ’12, Washington, DC, USA, IEEE Computer Society (2012) 553–567 7. Howard, A.: Qrauth. Bsc. thesis, Bournemouth University, Bournemouth, UK (2012) 9. Fu, H.P.: Pico: No more passwords! Msc. thesis, University of Leuven, Flanders, Belgium (2013) 11. Inc., C.O.: QRAuth. http://www.computingobjects.com/qrauthinfo (2012) Accessed: 2013-11-13. 12. Gibson, S.: Secure Quick Reliable Login. https://www.grc.com/sqrl/sqrl.htm (October 2013) Accessed: 2013-11-6. London, UK, UK, Springer-Verlag (1998) 91–104 14 passport protocol. In: Advances in CryptologyCRYPTO87, Springer (2006) 21–39 15 and its use in the ike protocols. In Boneh, D., ed.: Advances in Cryptology CRYPTO 2003. Volume 2729 of Lecture Notes in Computer Science. Springer Berlin Heidelberg (2003) 400–425 Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers Springer (2006) 1–19 17 passport protocol. In: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology. CRYPTO ’87, London, UK, UK, Springer-Verlag (1988) 21–39 19. Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: EUROCRYPT93, Lecture Notes in Computer Science 765, Springer-Verlag (1993) Proceedings of the 2008 Workshop on New Security Paradigms. NSPW ’08, New York, NY, USA, ACM (2008) 127–133

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1230 Unit Excer1

    • 313 Words
    • 2 Pages

    You can specify different password and account lockout policies for different sets of users. I believe this little bonus is quite big for most of the administrators.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant is that passwords can often be stolen, accidentally revealed, or forgotten.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    A scanner allows me to transfer paper documents onto the computer, such as letters, photograph page of a passport etc. This is something I do on a daily basis as I have to scan on candidate’s…

    • 1920 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Allensmith, S. C. (n.d.). Understanding Face Recognition Systems . (Course Technology ) Retrieved Sept. 16, 2014…

    • 325 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Password Theft

    • 6445 Words
    • 26 Pages

    Knowledge of the password is assumed to guarantee that the user is authentic. Each user registers initially (or is registered by someone else), using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. The weakness in this system for transactions that are significant (such as the exchange of money) is that passwords can often be stolen, accidentally revealed, or forgotten.…

    • 6445 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Oops with Foxpro

    • 4336 Words
    • 18 Pages

    This article was written by Gregory L. Reichert and uploaded to the CompuServe Fox Forum on the 19th January 1995. The text remains unaltered although I have taken the liberty of tidying up the code samples. The casual Web surfer should be warned, there's some pretty complex stuff here.…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    References: [1] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey, Comput. Networks 52 (12) 2292–2330 (2008). [2] Suat Ozdemir a, Yang Xiao, Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks. 53, 2022–2037 (2009) [3] Wei Zhang, Yonghe Liu, Sajal K. Das, Pradip De, Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach, Pervasive and Mobile Computing. 4, 658–680 (2008) [4] S. Zhu, S. Setia, S. Jajodia, P. Ning, An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks, in: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 260–272 (2004) [5] Wen TaoZhu, Jianying Zhou, Robert H. Deng, Feng Bao, Detecting node replication attacks in wireless sensor networks: A survey, Computer Networks 53, 945–960 (2009) [6] A. Perrig, R. Szewczyk, D. Tygar, V. Wen, D. Culler, SPINS: security protocols for sensor networks, Wireless Networks J. (WINE) 2 (5), 521 –534 (2002).…

    • 2530 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Cryptography

    • 2044 Words
    • 9 Pages

    Information security plays a pivotal role during internet communication in today’s era of technology. It is tremendously important for people committing etransactions. For naïve people it may seem to be not that necessary orincreased security may provide comfort to paranoid people but the truth is that it is absolutely essential when communication is carried between tens of millions of people daily. There are various cryptography methods that provide a means for secure commerce and payment to private communications and protecting passwords. Cryptography is necessary for secure communications; it is not by itself sufficient. The reader of this paper will find variants of cryptography and their applications. This paper has two major purposes. The first is to provide some real examples of cryptography in use today. The second is to provide tabular summarization and conclusion. Curious readers should check out some of the web pages and pdf in the bibliography below for further detailed — and interesting! — background information.…

    • 2044 Words
    • 9 Pages
    Powerful Essays

Related Topics