Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security The Almighty Buck

Banks Begin To Use RSA Keys 208

jnguy writes "According to the New York Times (free bacon required), banks are begining to look into using RSA keys for security. AOL has already begun offering its customers RSA keys at a premium price. Is this the future of security, and is it secure enough? How long before everyone needs to carry around 5 different RSA keys just to perform daily task?"
This discussion has been archived. No new comments can be posted.

Banks Begin To Use RSA Keys

Comments Filter:
  • by zxSpectrum ( 129457 ) on Saturday December 25, 2004 @08:38PM (#11182677) Homepage Journal
    I'm rather surprised: Several Norwegian banks have been using these RSA Hardware Tokens for a couple of years.
  • by Steven Reddie ( 237450 ) on Saturday December 25, 2004 @08:41PM (#11182688)
    The article is really talking about using hardware tokens for extra security since the private data is stored on an external token and can't be stolen by viruses, trojans, or phishing scams. I don't even see RSA mentioned in the article -- there is an inset picture of an RSA SecurID but that's as close as it gets.
  • This is news? (Score:5, Informative)

    by Nehle ( 784297 ) on Saturday December 25, 2004 @08:42PM (#11182693) Journal
    My bank (SEB, www.seb.se) has been using a hardware token system for years. I click the sign in button, enter my birthdate, receive two four-digit numbers, start the little device, enter my password and the two numbers and get a six-digit number that I enter in the login page and then I get logged in.
    Is this somehow different?

    Oh, and by the way, works like a charm and I feel a lot more secure than I do with static passwords
  • Old News (Score:3, Informative)

    by Ann Elk ( 668880 ) on Saturday December 25, 2004 @08:46PM (#11182706)

    Banks in Poland have been using physical security tokens for online access for a few years. Yawn...

  • Re:Thumb drives (Score:3, Informative)

    by jdhutchins ( 559010 ) on Saturday December 25, 2004 @08:49PM (#11182718)
    That's what I initally thought, but the article talks about a different kind of RSA "key". The article is about the hardware things that show a number that changes every 15sec or so, and you need that number to log in. The summary title is misleading (suprise suprise)
  • This is new? (Score:5, Informative)

    by wfberg ( 24378 ) on Saturday December 25, 2004 @09:06PM (#11182781)
    I've been using physical tokens to log on to e-banking for years. Not only that, but tokens that are significantly more secure than securID fobs, in that they support challenge/response and using a PIN to unlock it (two-factor security, and the PIN is only used with the token so it needn't be known at all to the bank).

    In fact, most banks are now switching to keypads that you plug your existing bankcard in, so they can piggyback on the tamper-resistant chipcard that's already on there (although it's slightly less advanced than some tokens, since chipcards don't support a clock that's permanently ticking).

    Most devices are from Vasco [vasco.com] who provide a wide range of tokens (some more secure than others). They even have challenge/response tokens that don't require you to copy the challenge; they have optical sensors that can read out a code that's blipped out by flashing blocks on your screen. Way cooler devices than those RSA securIDs.
  • by HotNeedleOfInquiry ( 598897 ) on Saturday December 25, 2004 @09:24PM (#11182857)
    Wells Fargo issues the RSA SecurID devices for security. Not a test, not a trial, My wife and I each have one.
  • by kaedemichi255 ( 834073 ) on Saturday December 25, 2004 @09:31PM (#11182876)
    The distinction really should be made between RSA encryption keys used for crytopgrahic algorithms, and RSA SecureID Tokens, which are what this news item is referring to, but are different from the public/private encryption keys!
  • by bobbuck ( 675253 ) on Saturday December 25, 2004 @10:27PM (#11183036)
    Just one problem. As computers get bigger they can check more keys. But a MUCH smaller match in computer power can make the keys so much bigger. Compare a 40bit key vs 80bit key. Bob and Alice's computer has to do twice as much work at 80bits. Eve-the-evesdropper's computer has to do 2^40 times as much work. (I know this is not techincally correct but it's the same idea.)

    People have been trying to factor large numbers for a long time, and it's a difficult problem.

    Merry Christmas! (or as they say at the NSA: qp93eywufaldksvnh)

  • by pekkak ( 840639 ) on Saturday December 25, 2004 @10:33PM (#11183054)
    It's the same in Finland. I have a card with about 100 disposable passwords and when I have used most of the passes the bank sends me a new card. In my opinion this is a lot more secure method than the permanent password scheme employed by many American banks. No offense, but as can be seen from the many comments posted here already, the US banking system is not exactly the state of the art. I mean, US still uses paper checks which I find astonishing. There must be incredible amounts of work and thus expenses involved in handling all those checks.
  • by Obiwan Kenobi ( 32807 ) <(evan) (at) (misterorange.com)> on Saturday December 25, 2004 @10:43PM (#11183072) Homepage
    I call FUD. I've worked in banks (and credit unions) as a network admin for over six years, and that is some bullshit.

    Now, understand that banks will use your information any way they can in-house, manipulate numbers and deposit totals and anything else analytical so they can sell a credit card or a loan (its called cross-selling). But what they cannot do is give your information to other 3rd parties without your direct consent unless its under federal mandate and/or decree (read: court order and/or the Patriot act).

    Now this is all fine and good, but when you do something substantial with your money and/or your financial outlook (say, investing or buying a home), you open up yourself to offers from 3rd parties. You sign a document saying so.

    Now the easiest thing is, before you sign something, ask them which companies are going to be behind this new venture. Whether it be an investing house (a lot of banks will farm out investing to a subsidiary and get kickbacks on it) or mortgages (who owns this loan? Can they sell it to a 3rd party mortgage company at a later date?), you need to simply be aware.

    Feel free to google "Bank Privacy" and read up on the hometown banks and the big boys: They all pretty much say the same thing. If they are under FDIC (for banks) or NCUA (for credit unions), they all fall under the same guidelines: Your information cannot be shared unless you say so. The federal privacy statements which are mandatory to be handed out upon opening an account, etc, say the same thing.

    Offshore data management services is simply a scarier way of saying Disaster Recovery. You want your bank to keep running even if the home office (or data center) explodes, right? Then don't start bitching about them backing up data in different places.
  • by EvilIdler ( 21087 ) on Saturday December 25, 2004 @11:08PM (#11183170)
    Not just a couple - I had it *eight years* ago with Storebrand..
  • by hanssprudel ( 323035 ) on Saturday December 25, 2004 @11:10PM (#11183173)
    Since this is already being moderated up, I want to note that poster is wrong.

    The system that the grandparent describes is based on VASCO [vasco.com] "Digipass" devices, that work just like the RSA secureid tokens, only that they also support PINs and challenge/response authentication. That means that if everything is done correctly (which I can't swear to) these tokens, which SEB have been using for more than five years, are considerably more secure than the normal RSA SecureID.

    Basically (very simplified) your normal SecureID will create a checksum from a secret and the current time, so the server can verify that person logging in is holding the token at this time. The Digipass, on the other hand, creates a checksum of the secret, the time, and the challenge from the server. This verifies that the person logging in has access to the token at this time, and created a checksum for this particular log in. And the fact that it also requires a personalized PIN to access the device means that stealing it will do you little good.
  • by jasonditz ( 597385 ) on Sunday December 26, 2004 @12:48AM (#11183486) Homepage
    The bank I used to use actually said the exact opposite: They can share with anybody unless you specifically tell them not to.

    The thing is, every 3 months or so they send a new copy of the (slightly modified) privacy agreement and if you don't send them another letter saying don't share my info, they consider it acceptance of the 'new' policy.
  • by Spiked_Three ( 626260 ) on Sunday December 26, 2004 @01:09AM (#11183548)
    "If banks are to adopt a universal crypto system, then perhaps AES or some form of elliptic curve crypto would be a better choice?"

    AES was not written in the US - so it is highly unlikely that US banks would adopt it as a first solution. Keep in mind the only US organization (NSA) that can truly say whether or not it is breakable will not say.
    Same goes for eliptical curves - they (NSA) will definetly say not all curves are secure - but they will not say which ones and why, but I doubt if you will see eliptical curves in any military applications in the future.

    Neither of these are possible choices for US banks.
    I have sat in these meetings between banks and NSA - and the banks are in quite a bind - they know they need to move past DES, but NSA won't tell them anything classified - so they have to put their foot out looking for the landmines on their own. Then NSA pipes up and shakes their head "no" when the do something wrong, which so far is everything. So what are the banks to do? My bet is they do eventually end up with AES, but after a couple of false starts.
  • by Nonesuch ( 90847 ) on Sunday December 26, 2004 @01:16AM (#11183564) Homepage Journal
    writes:
    "RSA keys" in the title is a bit misleading.. It makes it sounds like a full crypto implementation, using smart cards and all the capabilities that implies. Confusing the RSA crypto algorithm, with the SecurID card, a product made by the company RSA.
    A common mistake. Most of the articles [com.com] I've seen lately on the subject have not mentioned either "RSA" or "SecurID", just talking about "devices" or "tokens" or perhaps "two factor authentication".

    SecurID is just a clunky authentication system using a hardware token to display numbers used for the authentication (although, they do also offer software tokens. there is nothing magical about the hardware)

    Why not go to a modern smart card system? It can store full certificates, and tie directly into really strong security/crypto. Tie the smart card / cert into the autentication of your system, and into IPSec, SSL, etc.

    SecurID offers only the authentication piece, based on a completely closed algorithm.

    The SecurID hardware token has two primary advantages over smart cards, and most other authentication tokens:
    • RSA has patents on time-based tokens [yahoo.com], this allows for a simple sealed hardware token without any buttons.
    • No additional hardware or software or drivers are needed to authenticate. Just the token and (optionalyl) a user selected PIN.
    While smart cards have their place, they are not so great for handing out to remote users. For example, does anybody actually use the card reader that was distributed in the American Express "Blue" promotion a few years back?
  • by Nonesuch ( 90847 ) on Sunday December 26, 2004 @01:24AM (#11183582) Homepage Journal
    How long before someone finds a fast way of factoring large numbers and we're all screwed?
    There's no direct relationship between the SecurID tokens sold by RSA and the old RSA algorithm. Actually, the latest generation of SecurID tokens use AES, however RSA still ships backlogs of the older tokens which are built around a proprietary hash.

    Like most other response-only tokens, the authentication is based not on large primes like public-key authentication but rather on a shared secret (one embedded in the token, the other stored on the authentication server.

    Much work has been done towards cryptanalysis of response-only tokens, and a well-designed authentication system is very difficult to break blindly, just from observation of a few response pairs. There have been potentially successful attacks proposed against the old SecurID tokens due to a "vanishing differential" problem with certain seed values, but no proof of concept against that has succeeded, and the new AES tokens should not be vulnerable. More on this is available from the SecurID Users group [yahoo.com].

    As a counter-example, the old X9.9 challenge-response authentication system was based on DES encryption, and was not well-designed, was fatally flawed. Observation of a handful of challenges and responses cojuld allow an attacker to determine the seed value and compromise the authenticator.

  • by Nonesuch ( 90847 ) on Sunday December 26, 2004 @01:51AM (#11183641) Homepage Journal
    Tracy Reed writes:
    Around 5 years ago I was looking for a way to have a secure-id sort of solution without having to buy the proprietary software and hardware without any success.
    The first "open" standard for authentication tokens was part of ANSI X9.9, and was broken (and subsequently retracted [webservertalk.com]) back in 1999. The old X9.9 algorithm is still available as an optional authentication method in several hardware tokens offered by competitors of RSA/SecurID.

    Have you looked at GNU SASL [gnu.org] (Simple Authentication and Security Layer framework)?

    I even looked into building my own (I know a little about microcontrollers for the hardware device portion) but was not able to come up with any suitable algorithm. It seems like the security of our Linux systems and other systems which require authentication could really benefit from something like this.
    An open source implementation of the SecurID time-based authentication algorithm is not possible because RSA holds several patents covering their whole time-based authentication scheme. The closest solution in the open-source world might be OPIE (formerly S/Key). OpenBSD and other operating systems include S/Key support in the base OS.

    There are OPIE calculators for MD4/MD5 in Java and for most handhelds, but it is tough to find a SHA-1 or RMD-160 implemention, and I have yet to run across any dedicated hardware device that does nothing but handle OPIE authentication. With the uncertainty about SHA-1, You might plan to implement only RMD-160 (160 bit Ripe Message Digest). Tokens would need a bit more CPU power to handle a few hundred rounds, but at least there is a good chance that RMD will still be a viable hash, long after SHA-1 falls.

  • HBCI and GnuCash (Score:2, Informative)

    by Thorak ( 843574 ) on Sunday December 26, 2004 @05:24AM (#11184060)

    German banks use DES and RSA keys on chipcards for years. Together, they developed the Homebanking Computer Interface (HBCI) and the FinTS - Financial Transaction Services: http://www.hbci-zka.de/english/index.htm/ [hbci-zka.de]

    It works like a charm with http://www.gnucash.org/ [gnucash.org]. I just insert my chipcard into my reader and can do as many transactions as I want without the hassle of PIN/TAN crap and have a fully working financial solution for my everyday need.

  • by roady ( 30728 ) on Sunday December 26, 2004 @07:09AM (#11184213)
    Most of Europe is actually using either RSA tokens or RSA smartcards already.
  • by oliverthered ( 187439 ) <oliverthered@nOSPAm.hotmail.com> on Sunday December 26, 2004 @07:10AM (#11184217) Journal
    If you read the GPP you would have found out that CR is less prone to man-in-the-middle attacks.

    A CR system can take multiple inputs (one of which could be a hash of your transaction data)
    making the response unique to the transaction.

    SecurID uses a simple token that is not unique to the transaction and so is very vulnerable to man-in-the-middle attacks.
  • by Anonymous Coward on Sunday December 26, 2004 @07:20AM (#11184247)
    The big players on the field have broken rsa years ago already. The small ones can crack only about 2048 bit keys at the moment. That stuff is really protecting you from the John Does and amateurs only.

Happiness is twin floppies.

Working...