About
Subscribe
  • Home
  • /
  • TechForum
  • /
  • Authentication tokens: A response to the challenge of Internet banking fraud

Authentication tokens: A response to the challenge of Internet banking fraud

Johannesburg, 04 Aug 2004

The widespread roll-out of secure authentication tokens is currently the best way to reduce the risk of Internet banking fraud and, when used in conjunction with a challenge-response scenario, could help prevent the kind of online banking scams which hit SA last year.

This is according to Dr Gerhard Claassen, MD of the Cryptographic Business Unit at JSE-listed trusted transactions company, Prism Holdings, who describes secure authentication as the process by which a bank or financial institution verifies a customer`s identity.

Claassen says that to authenticate a user, electronic banking systems can examine what the user has (eg a banking card), what they know (eg password) and who they are (eg biometric scanning of a fingerprint or retina).

"Systems that utilise all three factors are inherently more secure than those which only make use of one and this is where the problems with Internet banking arise," he adds.

"Although card readers as well as biometric devices are available for most PCs and laptop computers, they are not widely used by the general online banking client. As a result, user authentication within the Internet banking domain is limited to `what you know` - your password."

Because Internet passwords today are based on static data - the user enters the same password each time he or she logs onto the banking Web site - hackers can record passwords while they are being entered and can then use them to gain fraudulent access to Internet banking accounts.

Claassen points out that the use of dynamic passwords for online authentication would serve to close this particular loophole in the security system.

Using dynamic data for passwords

"Dynamic data authentication involves the use of a secure authentication token which allows Internet banking clients, in unison with back-end banking systems, to dynamically generate a new password each time an Internet banking session is initiated.

"Since this password changes from one session to the next, there is no value in hackers attempting to record it."

Key to this process is the secure authentication token which usually takes the form of a small handheld device and which comes with or without a keypad and smart card reader. Using advanced encryption techniques, these tokens provide Internet banking users with access to the same unique log-on passwords as that generated by the back-end banking system. In this way the legitimate banking client and the bank are always in sync.

Generating passwords without the use of a smart card

Claassen warns that not all authentication tokens are equipped with smart card readers.

"Where tokens do not have access to smart cards to assist with the password generation process, both the end-user, customer device and the back-end banking system must have access to the same set of encryption techniques, security keys and data. The data used will often include time as well as a counter that is linked to the `number` of the particular password being created.

"Using this information in the same way as the token, the bank can generate the same dynamic password as the customer device and can compare the two to authenticate the user," he explains.

However, Claassen advises that these types of dynamic password devices can get out of sync with back-end systems, which is one of their major drawbacks.

"If a user mistakenly creates a password and does not submit it, the system will fall behind the device. The next time the customer wishes to log onto his or her Internet bank and submits the information provided by the token, the bank will deny access as it will not be the same as the information expected by the back-end."

Another issue relates to the time delay between a customer generating a password and sending that password to the back-end system.

"A reasonable time-window is necessary to ensure that the back-end can generate the same number as was submitted and to prevent Internet bandwidth and slow message delivery from causing problems, time windows have to be increased.

"As these become larger, so the door for hackers to capture and replay passwords starts to re-open," says Claassen.

The solution: Challenge-response

Claassen believes that challenge-response tokens are the solution to these problems. Equipped with PINpads and smart card readers, these tokens use a combination of information sent via the back-end system, and information securely stored on the smart card, to generate the dynamic password for the customer.

This type of mechanism would work as follows in a PC environment:

The bank customers would log onto the Internet banking site using his or her secret but static password. On receipt of this password, and now having identified the customer, the bank`s authentication server would respond via the Internet with a prompt, or "challenge". The customer would insert his or her smart card into the token and then key in this challenge.

The token, equipped with the data from the back-end, the secure and unique information from the smart card and specific cryptographic technology, would generate a response for the customer which would be displayed on the screen of the token. This response could only come from that specific customer device and could only be based on the use of that specific, bank-issued smart card.

The customer would then enter this encoded response via the Web site and it would be transmitted over the Internet to the bank`s authentication server. On receipt of the message, the banking server would find the customer`s record in its database, encrypt the same challenge using the shared secret key and compare the result with what the customer has sent it. If they match, the user has been authenticated.

"The challenge-response model is not open to replay as each challenge and resultant response is used only once. Also, given that this model requires the use of a bank-issued smart card which is very difficult to clone and which only works in the device together with a specific secret PIN, a second level of security, what you have, is introduced into the authentication system.

"At the moment, the negatives associated with the challenge-response type model relate to the costs incurred by the banks in making the tokens available as well as the fact that consumers have to be equipped with chip cards in order to use the system. The former issue should be naturally addressed as more and more vendors release products into the market and start competing on price.

"With the South African EMV (EuroPay, MasterCard, Visa) January 2005 deadline fast approaching, wide-scale roll-out of chip cards to consumers should also become less and less of an obstacle," concludes Claassen.

Share

Prism Holdings

JSE-listed Prism Holdings Limited is a leader in the field of secure electronic transaction technologies and services. The group has a strong presence in SA and an established and expanding footprint across Africa and South-East Asia. Prism`s head office is located in Johannesburg and has a regional office in Kuala Lumpur, Malaysia.

Prism has a proven track record in the delivery of trusted transaction technologies and end-to-end solutions for the retail, utilities, banking, cellular and petroleum industries. The group has developed and implemented innovative transaction and payment-centric intellectual property that bridges the following technologies:

* Chip cards including SIM cards, financial smart cards and prepaid telephone cards.
* Point-of-sale frameworks, applications and devices.
* OEM transaction modules including PINpads, card readers and outside payment terminals.
* Transaction security modules and servers and trusted centre solutions.
* In-store and forecourt payment servers, wireless application messaging gateways and value-added-services gateways.
* End-to-end secure electronic payment architectures for wired and wireless networks.

Editorial contacts

Marilyn de Villiers
Citigate PR
(011) 804 4900
Dr Gerhard Claassen
Prism Holdings Limited
(011) 548 1000