T/Key: Second-Factor Authentication From Secure Hash Chains
Title | T/Key: Second-Factor Authentication From Secure Hash Chains |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kogan, Dmitry, Manohar, Nathan, Boneh, Dan |
Conference Name | Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4946-8 |
Keywords | composability, compositionality, hash algorithms, hash chains, pubcrawl, Resiliency, Two factor Authentication, two-factor authentication |
Abstract | Time-based one-time password (TOTP) systems in use today require storing secrets on both the client and the server. As a result, an attack on the server can expose all second factors for all users in the system. We present T/Key, a time-based one-time password system that requires no secrets on the server. Our work modernizes the classic S/Key system and addresses the challenges in making such a system secure and practical. At the heart of our construction is a new lower bound analyzing the hardness of inverting hash chains composed of independent random functions, which formalizes the security of this widely used primitive. Additionally, we develop a near-optimal algorithm for quickly generating the required elements in a hash chain with little memory on the client. We report on our implementation of T/Key as an Android application. T/Key can be used as a replacement for current TOTP systems, and it remains secure in the event of a server-side compromise. The cost, as with S/Key, is that one-time passwords are longer than the standard six characters used in TOTP. |
URL | http://doi.acm.org/10.1145/3133956.3133989 |
DOI | 10.1145/3133956.3133989 |
Citation Key | kogan_t/key:_2017 |