Skip to main content

Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 969))

Abstract

The rush for improved security, particularly in banking, presents a frightening erosion of privacy. As fraud and theft rise, anti-fraud techniques subject user privacy, identity, and activity to ever-increasing risks. Techniques like behavioral analytics, biometric data exchange, persistent device identifiers, GPS/geo-fencing, knowledge-based authentication, on-line user activity tracking, social mapping and browser fingerprinting secretly share, profile, and feed sensitive user data into backend anti-fraud systems. This is usually invisible, and usually without user consent or awareness. It is also, unfortunately, necessary, partly because contemporary authentication is increasingly ineffective against modern attacks, but mostly because the idea of “usable” is confused with “invisible” most of the time. In the mind of a CISO, “stronger authentication” means a slower, less convenient, and more complicated experience for the user. Security and privacy tend to lose most battles against usability, particularly when friction impacts customer adoption or increases support costs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Cross-website activity tracking is made possible through 3rd party antifraud vendor insight among their many clients, and popular analytics platforms being present across many sites [1].

  2. 2.

    1984 OTP Patent http://www.google.com/patents/US4720860.

References

  1. Avast Forum. List of online banking sites in your country. https://forum.avast.com/index.php?topic=83592.0. Accessed 28 06 2018

  2. Bursztein, E., Aigrain, J., Moscicki, A., Mitchell, J.C.: The end is nigh: generic solving of text-based captchas. In: 8th USENIX Workshop on Offensive Technologies (WOOT 2014). USENIX Association (2014)

    Google Scholar 

  3. Castelluccia, C., Narayanan, A.: Privacy considerations of online behavioural tracking. In: The European Network and Information Security Agency (ENISA) (2012)

    Google Scholar 

  4. Clifton, B.: Understanding Web Analytics Accuracy (2010). https://brianclifton.com/pro-lounge-files/accuracy-whitepaper.pdf. Accessed 28 06 2018

  5. Dunkelman, O., Keller, N., Shamir, A.: A practical-time attack on the A5/3 cryptosystem used in third generation GSM telephony. Cryptology ePrint Archive: Report 2010/013 (2010). https://eprint.iacr.org/2010/013

  6. Krol, K., Philippou, E., De Cristofaro, E., A Sasse, M.: They brought in the horrible key ring thing! Analysing the usability of two-factor authentication in UK online banking. In: NDSS Workshop on Usable Security, USEC 2015 (2015)

    Google Scholar 

  7. Panjwani, S., Prakash, A.: Crowdsourcing attacks on biometric systems. In: The Tenth Symposium on Usable Privacy and Security (SOUPS). USENIX Association (2014)

    Google Scholar 

  8. Schechter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The emperor’s new security indicators an evaluation of website authentication and the effect of role playing on usability studies. In: The 2007 IEEE Symposium on Security and Privacy (2007)

    Google Scholar 

  9. Verizon. 2016 Data Breach Investigations Report (DBIR). http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/. Accessed 28 06 2018

Download references

Acknowledgments

We thank the reviewers and numerous industry security experts who freely and eagerly gave up their time to review our solution and their quest to try and find possible oversights in it.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Praveen Gauravaram .

Editor information

Editors and Affiliations

Appendices

Appendix

A Problems/Issues with Current 2FA Tech

This appendix supplements Sect. 2.

Most 2FA technology is based on one-time-passwords (OTP). 2FA has many shortcomings. It is important to consider them while designing or evaluating improved authentication.

2.1 A-1 Categories and Vulnerabilities of 2FA

This appendix groups the different kinds of 2FA available into ten categories, and outlines the drawbacks and vulnerabilities of each. To avoid repetition, Subsect. A-1.11 afterwards addresses general failures that all ten 2FA categories suffer.

2.1.1 A-1.1 OTP Hardware

Hardware-based or keyring-style OTP tokens are the most well-known 2FA category. They generate new random codes every one minute or so based on a per-token ID, the time, and seed or key material programmed by the vendor. Codes are typically valid for double or more the length of time they’re displayed (to accommodate clock skew and slow typists). When inventedFootnote 2 in 1984 (8 years before the invention of the world-wide web), time-limited OTP passcodes had better chance of improving security because networked machines and real-time attacks were rare (Fig. 10).

Fig. 10.
figure 10

OTP token

Security vulnerabilities of hardware OTP include:-

  1. (a)

    Man-in-the-Middle (MitM) attacks; intermediary can steal OTP.

  2. (b)

    No channel security; there is no association between OTP code and a secure channel, leaving the protection of codes against theft out-of-scope: it’s the website’s job to use TLS with HSTS and HPKP etc., & the user’s job not get tricked or downgraded.

  3. (c)

    Spoofing; there is no binding of tokens to resources. Imposters can capture codes, and have several minutes to use them.

  4. (d)

    Single channel transport; techniques which steal passwords like keyloggers, phishing, malware, and social engineering of the user equally succeed stealing OTP codes too.

  5. (e)

    No local protection; codes are typically displayed on a screen which has no protection against unauthorized viewing.

  6. (f)

    No utility for signing transactions; OTP codes bear no relation to user activity so are inappropriate to confirm user instructions.

  7. (g)

    No malware protection; Because OTP cannot sign transactions, malware can inject/modify instructions, which get innocently permitted by users unaware the OTP code is being hijacked.

  8. (h)

    Very low resistance to misuse by friends, family, or peers.

  9. (i)

    Intentional fraud: Sometimes it’s not the bad guys defrauding a user, but bad users defrauding (for example) their bank. Fraud-free guarantees are often abused by unscrupulous customers.

  10. (j)

    No non-repudiation; OTP does not prove user intent.

  11. (k)

    No PIN protection; most OTP tokens have no keypad.

  12. (l)

    Lacking mutual authentication; OTP code-use is one-way only; no mechanism to verify authenticity of the website exists.

  13. (m)

    Low Entropy; only short numeric codes are supported.

  14. (n)

    Serverside OTP support typically requires installation of hardware and drivers, which carry their own risks of compromise. The $1.1-trillion hack against the US Office of Personnel Management was ironically facilitated through privilege escalation attack against their OTP Driver software.

  15. (o)

    Seeds and Keys protection; OTP tokens are based on a master secret, which when stolen, compromises all user OTP tokens at once. This infamously occurred in 2011 when a phishing email stole keys from an OTP vendor which were subsequently used to facilitate military contractor organizations break-ins. Upto 40 million compromised tokens were subsequently replaced.

  16. (p)

    Most OTP is based on asymmetric cryptography, threatened by quantum computing and advances in factoring techniques.

Drawbacks of OTP hardware include:

  1. (q)

    Multiple Usability issues: they interrupt and dramatically slow down user authentications. They have no backlight making them sometimes difficult to read. They are bulky and require physical carriage. Usability is so poor; banking customers have switched banks to avoid being forced to use OTP hardware [6].

  2. (r)

    They do not scale: Users require a new physical OTP token for every website login requiring protection. At time of writing, this Author (a long-time internet user) has 2838 unique accounts across 2277 websites; if all were protected by OTP-token, that would cost $100,000 in tokens, weigh 93lbs (42 kg), take half an hour to locate the correct one for each login, prevent logins when away from the token-room, and require 56 replacement tokens each week as batteries go flat, taking 40 h to reenroll, costing $20,000 p.a. to buy the replacements.

  3. (s)

    They fail, expire, and go flat: OTP tokens typically last 5 years. Some policies expire them sooner (prior to battery exhaustion) some fail through clock sync, battery or environmental issues.

  4. (t)

    Prevent Fast and Automatic logins; OTPs require manual code reading and typing. They cannot support automatic/rapid use.

  5. (u)

    Slow setup; OTP’s require shipping, and once received, usually require ~30 min setup and enrollment procedures.

  6. (v)

    3rd party trust; OTP keys are typically made at and kept with the token vendor. Any theft of misuse of these keys allows an OTP token to be emulated by an adversary; see (o) above.

  7. (w)

    Limited offline utility; OTP tokens are rarely used to authenticate customers over the phone or in person.

  8. (x)

    Single token only; Most OTP client implementations allow for just one user token; there is no provision for users needing more (e.g. one token at home and a second at work).

  9. (y)

    No self-service; OTP are hardware devices, which require costly deployment/handling which users cannot do themselves.

  10. (z)

    High costs; OTP devices themselves are expensive, the serverside hardware and licenses are likewise expensive, and the support costs and periodic replacements also expensive.

2.1.2 A-1.2 OTP with Transaction-Signing (OTP+TV)

Some OTP hardware includes a keypad, useable for Transaction Verification (TV). These are typically PIN protected and also capable of providing plain OTP codes for authentication. Signing consists of entering numbers (e.g. PIN, source, destination, and $ amount of financial transfers) to produce a verification code based on all the information keyed in, which the user then types back into the website (Fig. 11).

Fig. 11.
figure 11

OTP+TV

Security vulnerabilities of hardware OTP+TV include:

  1. (a)

    When used in OTP-only mode (as opposed to TV mode), these suffer all the same problems as plain OTP except for the ones mitigated through the use of the PIN pad protection.

  2. (b)

    Rogue transactions via MitM, spoofing, and malware: In banking context, the limited no-prompts OTP-TV display makes it hard for users to understand the meaning of the numbers they key in and to know and check they’re correct in the following three different places: (1) their original transaction they submitted (e.g. through their PC). (2) the on-PC-screen prompts telling the what to type on their OTP+TV keypad, and (3) the numbers they manually enter on it.

An adversary with privilege to modify user screens can substitute the intended receiving account destination with their own, and can adjust transaction amount almost unperceivably. For example: to transfer $100, a user keys in 00010000. If malware told them 00100000 instead, it’s unlikely they’d notice. Similarly, recipient partial-account numbers might be subtly or completely adjusted, and/or the bank to which the payment is intended, not being part of the signature at all, is free to be modified by the attacker.

  1. (c)

    Partial signatures only: no facility exists to sign the actual submitted transaction (which would include recipient names, routing numbers, banks, dates, other instructions, and notes); signatures are limited only to the least-significant digits of recipient account identifiers; the rest is at risk to malware.

Drawbacks of OTP+TV hardware include:

  1. (d)

    These tokens also suffer all the drawbacks of OTP tokens discussed in Sect. A-1.1.

  2. (e)

    Usability; entering every transaction twice on the small and low-quality keypad becomes a major chore for users. Many users, including this author, dread using these exhausting devices so fiercely, that avoiding transactions as much as possible becomes common practice.

2.1.3 A-1.3 Mobile App OTP

Some mobile apps replicate OTP hardware, thus they suffer most of the vulnerabilities and drawbacks discussed in Sect. A-1.1 in addition to more discussed here (Fig. 12).

Fig. 12.
figure 12

Mobile OTP

Security vulnerabilities include:

  1. (a)

    Cloning; Mobile-OTP keys live usually without protection on the user’s mobile device.

  2. (b)

    No Key encryption; most Mobile-OTP does not have PIN or passwords protecting OTP codes. While phones themselves are usually locked, 31% of us still suffer a “snoop attack” against our phones every year anyhow [6].

  3. (c)

    Enrollment attacks; Enrolling a Mobile-OTP requires sending the key material to the device; this is usually done via QR code or typeable text string. Intercepting these codes allow adversaries to generate future OTP codes at will.

  4. (d)

    Serverside break-in; The webserver must store the per-user OTP key in their database; this is usually kept in the same table that usernames and passwords are in. Any webserver flaw resulting in a password breach will also result in the loss of all OTP keys as well. Such break-ins and thefts are common.

  5. (e)

    Mobile malware; In-device malware might have access to steal user keys. On “rooted” or “jailbroken” devices, and unpatched/older devices with escalation flaws, nothing protects the keys.

  6. (f)

    Cloud backup; Most mobile devices backup their storage to cloud servers, putting OTP keys at risk of serverside theft.

Drawbacks of Mobile-OTP include:

  1. (g)

    Usability; while Mobile-OTP enjoys the benefit of being always available to most users most of the time, it does still require the user to unlock their phone, locate the requisite app and open it, then hunt through their list of OTP codes for the one relevant to their account and username, before finding and typing back in their OTP code.

  2. (h)

    Scalability; finding the right code to use at each login is an N-squared complexity problem. Each extra login makes it slower and harder for all other logins across all accounts every time.

  3. (i)

    Compatibility; many OTP apps refuse to run on older devices “for security reasons”. Ironically, this misguided protection effort guarantees those users get no protection at all.

  4. (j)

    Mobile authentication; Using Mobile-OTP to access a Mobile account on the same device requires a competent user who can quickly switch between apps, and remember random 8 digit codes. Millions of users, especially elderly, young children, and others most vulnerable will be unable to do this.

2.1.4 A-1.4 Modern Multifactor Mobile Apps with Signing

Newer mobile apps are significantly more advanced than the Mobile-OTP category, carrying vastly improved usability, good transaction verification (TV) and signing, and sensible protections like password or biometric key protection, thus can guard against some of the more obvious attack scenarios. Since many incorporate GPS, biometrics, device-ids and more, they are more accurately described as multifactor (MFA) than just second-factor.

Mobile phones travel almost everywhere with nearly every person who would want to have 2FA. They’re a central feature in the lives many, who take great care to protect them. They do still get lost or stolen, but we think it’s fair to say that there is no single thing that humans put more collective effort into ensuring not to lose, than their phones.

With their ubiquity, sensors, power, and network connections, mobile phones are ideal authenticators.

Security vulnerabilities include:

  1. (a)

    No MitM, spoofing; or malware protection; An imposter can cause a legitimate Mobile-MFA user to authenticate the wrong person (the imposter). There are some apps which use a phone camera to scan onscreen codes in a partial attempt to prevent simplistic MitM, but these too fail to prevent authenticating the attacker (since the attacker is free to simply present the scannable challenge to the legitimate user.)

  2. (b)

    No channel protection; No Mobile-MFA implements working mutual authentication – absent a skilled and attentive user, no protection exists to ensure the users connection to their webserver is uncompromised.

  3. (c)

    Cloud backup; Modern Mobile-MFA is less susceptible to insecurities of backup data on cloud servers, since they are expected to be making use of PINs, biometrics, device-ids, and protected storage (non-backed-up) features of the modern mobile OS, however, implementations between vendors vary, and not all of them take these precautions.

  4. (d)

    Downgrade vulnerabilities; most Mobile MFA supports insecure fallback methods such as resorting to code-entry Mobile-OTP for situations where the app has connectivity issues, subjecting them to the vulnerabilities and drawbacks discussed in the previous Sect. A-1.3.

Drawbacks of Mobile-MFA include:

  1. (e)

    Usability drawbacks vary widely across Mobile-MFA vendors. Some apps auto-open using PUSH and auto-communicate codes and signatures so users don’t need to type things in. Others require users to manually open apps and find tokens.

  2. (f)

    Banned-Camera policies; Mobile-MFA requiring cameras will not function in workplaces (e.g. military, secure) prohibiting them or their use (especially recording screens with phones).

  3. (g)

    In-device switching; Using an app or browser on the same mobile device as the Mobile-MFA requires user’s adept at using their mobile OS to switch back and forth between apps.

  4. (h)

    Offline usage; Mobile-MFA requires a working data (wifi or cellular) connection to function. International travelers and low-credit mobile users will find this expensive and frustrating.

  5. (i)

    SIM change; Many Mobile-MFA apps cease to function when SIM cards are changed, purportedly for “security reasons” (we assume stolen phones or hijacked apps). Since most international travelers change SIMs when abroad to keep their roaming costs low, this causes cost and usability problems.

  6. (j)

    Developer mode; again for “security reasons”, many Mobile-MFA apps refuse to open if the phone is in “development mode”. People with “rooted” or “jailbroken” their devices are permanently blocked from using these Mobile-MFA apps.

2.1.5 A-1.5 SMS OTP

Mobile phone text-messages are the mode widespread OTP in use, and the least secure, and the least reliable (Fig. 13).

Fig. 13.
figure 13

SMS OTP

Security vulnerabilities are:

  1. (a)

    Number porting; Many ways exist to hijack a user’s phone number and SMS messages; this is a common and successful attack.

  2. (b)

    SS7 redirection; Cell-network protocols permit unscrupulous operators anywhere in the world to inject commands rerouting (thus intercepting) SMS, voice, and cellular data traffic for any subscriber. Public, with-permission (but without-assistance) attacks against high-profile victims have been demonstrated.

  3. (c)

    Malicious micro-cells, and radio sniffing; Software-Defined Radios (SDR) sell for under $10 on eBay, and free opensource software turns them into local (and remote) SMS sniffers.

  4. (d)

    Weak, or no, encryption; Mobile network encryption is weak, taking (depending on generation) between 2 h to less than 1 s to crack on a single PC [5]. Modified cell traffic attacks which disable encryption entirely are relatively easy to mount, are commonly found active in cities, and proceed undetected on all but purpose-designed secure-cell handsets.

  5. (e)

    iMessage sharing; SMS-OTP messages often distribute across different accountholder devices and show up on multiple user screens at once. This further subjects SMS to thefts since intruders with user cloud account access can register their own devices on this account to receive them (Fig. 14).

    Fig. 14.
    figure 14

    A governments’ advice to citizens urging to disable SMS-OTP before travelling abroad.

  6. (f)

    Downgrade situations Many organizations recommend users disable their SMS-OTP when travelling; a risky decision for most users since this is the time they will most need 2FA!

  7. (g)

    Low local protection; many handsets display messages on lock-screens, with no protection against being observed by malicious 3rd parties.

  8. (h)

    Social-Engineering against 3rd parties; Many customer service workers in the communications industry can be successfully convinced by deception or bribery to affect a SIM porting or other adjustment to deliver SMS-OTP to attackers.

  9. (i)

    Malicious replacement of SMS-OTP number at the website; Software or operators running the website can be tricked into changing the phone number to which codes get sent. Attacks involving combinations of social engineering against multiple third parties exist which provide an adversary direct access to change the SMS-OTP phone number themselves online.

  10. (j)

    Mobile Malware; iOS and Android operating systems both include a “permissions” setting which permits Mobile-Apps to read and interfere with SMS. Malicious apps exist which forward SMS to attackers and hide their display to the user.

  11. (k)

    Third party trust; The SMS-OTP itself travels through many different networks before reaching the user; any breakdown of trust along the way affords malicious opportunity.

  12. (l)

    Most OTP Hardware vulnerabilities also apply to SMS-OTP; Including: MitM; no channel security; spoofing; single channel transport; keyloggers, phishing, malware, social engineering; no utility for signing transactions; no malware protection (distinct from mobile malware), low resistance to misuse by friends, family, or peers; intentional fraud; no non-repudiation; no mutual auth; (full descriptions in Subsect. A-1.1)

Drawbacks of SMS OTP include:

  1. (m)

    SIM Change; SMS-OTP stops working when users change phone numbers. This is common for international travelers.

  2. (n)

    Unreliable delivery; SMS message delivery is often delayed or fails (a significant problem since OTP codes expire quickly).

  3. (o)

    No offline usage; SMS will never arrive unless a user has a valid connected and paid-up cellular account.

  4. (p)

    Poor coverage; Many places exist with no cellular coverage.

  5. (q)

    Usability: SMS-OTP dramatically slows all logins; this can be minutes or more in on poor cellular networks.

  6. (r)

    SMS-OTP does not scale well and suffers poor portability. Imagine changing your phone number on 1000 accounts.

  7. (s)

    Prevents Fast/Automatic logins; Waiting for and typing-in an SMS-OTP makes fast and/or automated logins impossible.

  8. (t)

    No secure self-service replacement; Lost phones (or non-working SMS delivery of any kind) require operator-assisted bypass. Phones often get lost, so help-desks become used to allowing users to bypass SMS-OTP. Spotting malicious users in the flood of legitimate bypasses is difficult.

  9. (u)

    Expensive support and losses; help desks are needed to handle customer SMS-OTP bypass. Fraud teams and products are needed to mitigate attacks overcoming SMS-OTP protection.

  10. (v)

    High costs; Sending SMS with reliably delivery costs more.

  11. (w)

    Banned; NIST 800-63B says not to use SMS, and that it will be banned in future. Many telcos have said this for years.

2.1.6 A-1.6 In-Device Biometrics

Broadly speaking, there are two types of biometrics (Fig. 15):-

Fig. 15.
figure 15

In-Device biometrics

  1. (1)

    In-Device, which typically make use of secure hardware within a device to record and later compare user biometric features, but never send biometric features or scans over networks, and

  2. (2)

    Remote biometrics, where the user biometric (e.g. their voice) is sent to a remote machine for processing. In-Device are considered “secure”, since considerable effort is typically applied by the manufacturer to prevent theft and feature extraction. Remote biometrics are considered extremely dangerous, since raw biometrics data is subject to theft both in transit and at rest. Because biometrics can never be changed once compromised, many jurisdictions and countries completely ban the transmission and/or storage of biometric data through networks for all or part (e.g. just children) of their population.

Security vulnerabilities of In-Device biometrics include:-

  1. (a)

    Not all phone manufacturers implement biometrics technologies well. Some create purpose-built secure enclaves for biometric processing & offer well designed API interfaces, others do none of that. One popular platform SDK includes a key-enumeration API; any app can extract every fingerprint key from the phone. It also has no biometric cryptography API at all; developers have no option but to write insecure code.

  2. (b)

    All biometrics reduce overall user security, because they all offer PIN or password bypass for situations where user biometrics fail (e.g. fingerprints after swimming or rough manual labor). An adversary now has 2 different ways to compromise protection; steal a fingerprint or guess a password.

Some argue that passwords become stronger since they’re used less, and thus harder to observe, however, adversaries with that level of access can engineer password-theft scenarios (e.g. fail a fingerprint several times to force the user to enter their code).

  1. (c)

    False vendor claims; The world’s strongest and most advanced (for those who recall vendor advertising at the time) fingerprint biometrics with subdermal imaging and secure enclave was hacked less than 48 h after release using a laser printer and wood glue. Marketing messages were posthumously amended, the vendor claiming they meant “more secure because more people will use it instead of leave their phones unlocked” (which is true), despite the fact it reduced security for their customers already using passcodes, who opted in.

Most biometrics use extracted features and approximation to calculate probabilities of match, making them unsuitable for hashing-technique protection, yet many vendors make clearly untrue “completely safe against theft” claims on these grounds.

  1. (d)

    Low entropy (depending on the type of biometric and sensors); biometric efficacy is a tradeoff between false negatives and positives; mimicry can defeat voiceprints 33% of the time.

  2. (e)

    Easily stolen keys; A fingerprint protected mobile phone will spend almost all its life covered in legitimate user fingerprints.

  3. (f)

    Easily copied; Custom silicone finger-caps (e.g. to defeat shift-work timeclocks) made to copy any prints you supply cost $20.

  4. (g)

    Unchangeable keys; there is no recovery after theft.

  5. (h)

    Widely collected keys; Travelers, criminals, and voters routinely provide fingerprints. Many of these collections are shared or have been hacked and stolen (or will be in future).

  6. (i)

    Vulnerable to failures in unrelated systems; Biometrics stolen online may be useable to defeat those used in-device.

Drawbacks of In-Device biometrics include:-

  1. (j)

    False negatives; biometrics often don’t work. (refer Fig. 16).

    Fig. 16.
    figure 16

    Why adding extra security makes things weaker.

  2. (k)

    Environmental reliance; some biometrics rely on the conditions of collection. Face-recognition often fails at night time.

  3. (l)

    Backups; In-Device biometrics are not useful for protecting remote resources (e.g. cloud storage).

  4. (m)

    Portability. Complete re-enrollment is needed on new devices.

2.1.7 A-1.7 Biometrics Collected Remotely

These are the worst and most reckless form of security: refer explanation at A-1.6 (2). They are already widely banned.

Security vulnerabilities of remote biometrics include:-

  1. (a)

    In-Device biometric vulnerabilities also apply to these.

  2. (b)

    Trivially vulnerable to theft during use, outside of use, from public archives and directly from stored feature databases.

  3. (c)

    Often transmitted in-the-clear; (e.g. most voice remote-biometrics take place over unsecured telephone networks).

Drawbacks of remote biometrics include:-

  1. (d)

    Illegal to use in many places and on certain people (e.g. kids).

  2. (e)

    Easy to steal. No way to change once stolen.

  3. (f)

    Dictionary attackable; not all remote-biometrics have rate-limits on guessing, and combined with the low entropy of many remote-biometrics, brute-force access is feasible.

  4. (g)

    Imprecise; most remote-biometrics must suffer the inadequacies of the “weakest acceptable collection device” (e.g. poor voice connections for voice).

  5. (h)

    Enormous negative privacy implications; biometrics facilitate automated non-consensual surveillance and tracking of subjects in a wide and increasing range of circumstances.

2.1.8 A-1.8 USB Gadgets and Smartcards

These screenless devices which attach to your computer (e.g. pluggable USB keys), or attach to a reader which is itself attached to your computer (e.g. keyboard with card-reader) (Fig. 17).

Fig. 17.
figure 17

USB OTP

Security vulnerabilities of connectable gadgets include:

  1. (a)

    Malware; all connectable gadgets are at full mercy of whatever infections might be present on their host machine.

  2. (b)

    MitM; USB OTP has 2 options: (1) defend MitM attacks (e.g. certificate-substitution), making them unusable in workplaces with DPI firewalls, or (2) accept intermediaries (and attackers).

  3. (c)

    Injected transactions; with no on-device screen, the signing user has no means to verify what they’re signing.

  4. (d)

    Piggyback risks; USB memory sticks can be disguised as USB tokens, facilitating unauthorized carriage and use at work.

  5. (e)

    Infection vector; USB-OTP tokens are computing devices; programmable to infect host computers. USB attacks like hardware keyloggers, PC wifi bugs, and DMA-memory-theft bootloaders can also be disguised to look like USB-OTP.

  6. (f)

    Increased social-engineering risks; plausible bypass excuses exist (e.g. tokens left at home, not carried on vacation, etc.) making it hard for help-to desks recognize intruders.

Drawbacks of connectable gadgets include:

  1. (g)

    Limited compatibility; there are many different kinds of plugs used across phones and PCs, like USB-A, USB-B, Micro-USB, Mini-USB, USB-C, iPhone 30pin, lightening and whatever-comes-next. No USB-OTP supports all these. Users with multiple devices, or who change devices, or don’t have slots on their device may find their USB-OTP will no longer connect.

  2. (h)

    Workplace bans; security conscious organizations do not allow the use or connection of USB devices.

  3. (i)

    Storage security; Workplaces that do allow USB often prohibit the transport of USB devices into or out of the workplace, forcing employees to leave them unattended after hours.

  4. (j)

    Difficult to scale; different devices, vendors, and standards are incompatible. Multiple different USB-OTP’s will be needed to protect many accounts, each one suitable for only a small subset, leaving it for the user to remember which-is-for-what.

  5. (k)

    Single-device only; USB-OTP works only with one device at a time usually; there is no way to have a spare for emergencies.

  6. (l)

    Inconvenience; carrying devices everywhere so you can login when you need also raises the risk of USB-OTP loss or theft.

2.1.9 A-1.9 Client TLS Certificates

Most browsers natively support X.509 client certificates. So does other software, and custom applications exist also making use of similar Public Key Infrastructure (PKI) (Fig. 18).

Fig. 18.
figure 18

X.509 PKI diagram

Vulnerabilities include:-

Certificate compromise; client certificates are stealable computer files. They have passwords, but can be brute-force and dictionary-attacked

  1. (a)

    attacked offline, or passwords stolen.

  2. (b)

    Malware; PKI offers no protection against malware.

  3. (c)

    CA Compromise; Certificate Authorities issuing client certificates can and have be compromised.

  4. (d)

    Checking certificate legitimacy is difficult, (impossible on some devices). Users rarely verify certificates or legitimacy.

Drawbacks of PKI include:

  1. (e)

    Usability; PKI is one of the least useable 2FA methods. It requires highly competent users. Enrollment, use, and renewal are challenging. Implementation is radically different across devices and vendors, and frequently changes with upgrades.

  2. (f)

    Compatibility; There are many PKI compatibility differences, file types, encoding formats, ciphers and digests. Only a fraction those work in any particular O/S and software.

  3. (g)

    Expiry; certificate lifetime is usually short, (typically one year, or much less for trial certificates). Users must re-endure the challenging reissuance process often. Old certificates must still be kept for future signature checking, and these make ongoing usage even worse (user need to select their current login certificate, named identically to all their expired ones).

  4. (h)

    Cost; Most client PKI requires payment, often high, to a Certificate Authority (CA), usually annually.

  5. (i)

    CA Revocation; this invalidates all user certificates at once.

  6. (j)

    Portability; Certificate re-use is possible across many devices, but the steps needed to make this work are extremely complex.

2.1.10 A-1.10 Paper Lists (TAN)

Transactional Access Numbers (TAN) are codes typically printed in a grid requiring users to locate via some index number or a row and column id the OTP code to use. Some are single-use only (Fig. 19).

Fig. 19.
figure 19

Single-use TAN

Security vulnerabilities of TAN include:

  1. (a)

    TAN’s suffer the same vulnerabilities as OTP hardware listed in Sect. A-1.1(a) through (m).

  2. (b)

    TAN Pharming is an attack technique which tricks users into revealing TAN codes to an attacker, who is then free to use them in subsequent attacks. They are facilitated by the predictability of the TAN index (e.g. a TAN card with rows and columns will always have a TAN code at location A1).

  3. (c)

    A server needing to verify TAN correctness necessarily holds sufficient information to do this, which is then susceptible to theft (and offline dictionary attack if necessary); one server-side break-in can invalidate all issued TANs at once.

Drawbacks of TAN include:

  1. (d)

    Do not scale; If activated on thousands of accounts, a user would need thousands of individual TAN lists or cards.

Physical replacement issues; If used regularly, expiring TANs would require frequent replacement, and reusable TANs would become reconstructable to eavesdroppers.

2.1.11 A-1.11 Scope Failures Across All 2FA (and Non-2FA)

Within every category, many vendors & products exist, each with their own and differing shortcomings (not covered in this paper). The broadest shortcoming across all 2FA categories (and indeed, most non-2FA alternatives as well) is “scope”. Most vendors push responsibility for “difficult” security problems to their customers.

A-1.11.1 Reliable Initial User Identification

The intersection between identity and authentication is hard to secure; so much so that all 2FA technologies chose not to address this problem. This leaves a gap between the identification of the new user, and their enrollment in 2FA. All 2FA categories leave opportunity for intermediaries to hijack or subvert the deployment process. Many providers mix deployment with verification such as by physically shipping devices, keys, unlock codes, and TANs in postal mail, or by using SMS, phone, or email to deliver PINs or enrollment keys. All those shipping measures are unreliable, offering interception, substitution, and facilitating a range of social-engineering opportunities against both users and staff alike. They also require soliciting personal address information from users. Google, during the 2011 AISA National Conference, revealed the single biggest issue preventing uptake of their SMS-OTP product was user reluctance to provide their phone number.

A-1.11.2 Enrolment Across Compromised Channels

2FA is deployed because risk is identified among users, so it’s clearly an oversight to ignore this risk during the 2FA enrollment.

Assuming a user took delivery of their 2FA solution without incident, none offers satisfactory protection to prevent the attacker (1) either stealing the 2FA for themselves, (2) tricking the 2FA into enrolling the attacker instead of the user, or (3) downgrading the protection or preventing and/or spoofing enrollment entirely.

A-1.11.3 Loss Handling

All 2FA is subject to loss or destruction, or dependent on secrets that users might forget, particularly the elderly, & especially when 2FA is used infrequently. Some 2FA is version dependent, and fails when updates take place (for example; Java) or machines change (e.g. pluggable USB devices when users switch to an iPad), or after certain intervals of time or when batteries go flat.

2FA bypass is an often-exploited shortcoming across all 2FA categories. It is the fault of the 2FA leaving loss-handling outside the scope of protection which caused this problem. Each deployment requires its own re-enrolment procedure, and most make use of fallback/recovery mechanisms that do not use 2FA.

A-1.11.4 Social Engineering of Staff

For all users who cannot log in with their 2FA for any reason (e.g. Sect. A-1.11.3), some method of bypass is introduced. Support staff with access to change or remove 2FA is one common method. Since these staff are so accustomed to dealing with average legitimate users and everyday problems, it becomes very difficult for them to detect an account takeover attack being performed by a social engineer. Many headline news stories of high-profile 2FA-bypass account takeovers and online banking thefts facilitated through 2FA-bypass have been published.

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Drake, C., Gauravaram, P. (2019). Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5826-5_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5825-8

  • Online ISBN: 978-981-13-5826-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics