Monday, August 20, 2012

Tokens are not as secure as previously thought

Tokens used in many companies and government institutions such as the RSA SecurID 800, as data security systems plus admittance to computers are vulnerable to burglary. French analysts napisanemu exactly causes malicious code, in 13 minutes gained a legend, which allows reading of numbers generated by the token media reported tokens through the last decade, according to security analysts, former better security than passwords, as they used the so-called. Two-factor authentication used them globally with the password rules are generated according to the specified two keys six-piece, which is the security password to log on to the database, servers, computers, and information systems such as electronic banking. Clipping was based on the initial issue, introduced by the manufacturer as an optional third-party RSA Security. At the beginning of the use of tokens were independent units, of which the operator of the LCD display had to be read in a number of maxima and from the moment they enter the system. Be that as it may after a few years on the market, dominated by modern tokens connected via USB - Indeed, lest login automatically followed the general computer scientists and cryptographers team Prosecco from Institut National de Recherche en Informatique et en Automatique (INRIA) in France, made a successful attack on such a RSA, making over 13 minutes extract of the current user key, making token useless. As New Scientist reported, used the attack working class and the identity cards of digital security Estonian argument as an individual, in the case of a digital signature which the team managed to stay in the French cryptanalysts within 13 hours invasion called "padding oracle" is quite hazy. At the tokens are for Dubel types of keys. The best route to the device, the user further. This newly past is exported and imported to and from the token in encrypted form close a special function. Attackers have used this function to modify the encrypted consignment adding pointless additions and wheel support for a reason written malicious code to export the token. Of course, the key generated errors. But they were so much specifically that in addition to quite a large number of repetitions of such an operation can be read easily without knowing the public key, and the key equipment test guess that produce numeryhasła token. In the attack on RSA was necessary to repeat 9400, which took 13 minutes As the levels of information technology portal The Register, lubricate the French researchers is extremely dangerous. A successful experiment because it means that it is enough that the computer infected right, malicious code for 13 minutes was hooked USB token, the malware intercepts the encrypted key, break it and send over the Internet. This allows hackers to spoof the bottom of the owners of the token which ideally will facilitate further hacking into computer systems, databases, or even the same

No comments:

Post a Comment