Advertisement

Security Analysis of Mobile Phones Used as OTP Generators

  • Håvard Raddum
  • Lars Hopland Nestås
  • Kjell Jørgen Hole
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6033)

Abstract

The Norwegian company Encap has developed protocols enabling individuals to use their mobile phones as one-time password (OTP) generators. An initial analysis of the protocols reveals minor security flaws. System-level testing of an online bank utilizing Encap’s solution then shows that several attacks allow a malicious individual to turn his own mobile phone into an OTP generator for another individual’s bank account. Some of the suggested countermeasures to thwart the attacks are already incorporated in an updated version of the online banking system.

Keywords

Mobile Phone Authentication Protocol Activation Protocol Online Bank Secure Object 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Hagalisletto, A.M., Riiber, A.: Using the Mobile Phone in Two-Factor Authentication, Encap white paper, www.encap.no/admin/userfiles/file/iwssi2007-05.pdf
  2. 2.
    Raddum, H., Nestås, L.H., Hole, K.J.: Security Analysis of Mobile Phones Used as OTP Generators, Reports in Informatics, 392, The University of Bergen (2010), www.ii.uib.no/publikasjoner/texrap/pdf/2010-392.pdf
  3. 3.
    RFC 2631, Diffie–Hellman Key Agreement Method (June 1999), tools.ietf.org/html/rfc2631
  4. 4.
    Jøsang, A., AlFayyadh, B., Grandison, T., AlZomai, M., McNamara, J.: Security Usability Principles for Vulnerability Analysis and Risk Assessment. Presented at the Twenty-Third Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, USA, December 10-14 (2007), www.acsac.org/2007/papers/45.pdf
  5. 5.
    Hole, K.J., Klingsheim, A.N., Netland, L.-H., Espelid, Y., Tjøstheim, T., Moen, V.: Risk Assessment of a National Security Infrastructure. IEEE Security & Privacy (January/February 2009), www.nowires.org/Papers-PDF/RiskEvaluation.pdf

Copyright information

© IFIP International Federation for Information Processing 2010

Authors and Affiliations

  • Håvard Raddum
    • 1
  • Lars Hopland Nestås
    • 1
  • Kjell Jørgen Hole
    • 1
  1. 1.Department of InformaticsUniversity of BergenNorway

Personalised recommendations