Banks Begin To Use RSA Keys 208
jnguy writes "According to the New York Times (free bacon required), banks are begining to look into using RSA keys for security. AOL has already begun offering its customers RSA keys at a premium price. Is this the future of security, and is it secure enough? How long before everyone needs to carry around 5 different RSA keys just to perform daily task?"
Heh? This is old news (Score:5, Informative)
Article not about "RSA Keys" -- Hardware tokens (Score:5, Informative)
This is news? (Score:5, Informative)
Is this somehow different?
Oh, and by the way, works like a charm and I feel a lot more secure than I do with static passwords
Old News (Score:3, Informative)
Banks in Poland have been using physical security tokens for online access for a few years. Yawn...
Re:Thumb drives (Score:3, Informative)
This is new? (Score:5, Informative)
In fact, most banks are now switching to keypads that you plug your existing bankcard in, so they can piggyback on the tamper-resistant chipcard that's already on there (although it's slightly less advanced than some tokens, since chipcards don't support a clock that's permanently ticking).
Most devices are from Vasco [vasco.com] who provide a wide range of tokens (some more secure than others). They even have challenge/response tokens that don't require you to copy the challenge; they have optical sensors that can read out a code that's blipped out by flashing blocks on your screen. Way cooler devices than those RSA securIDs.
Re:Article not about "RSA Keys" -- Hardware tokens (Score:5, Informative)
Argh... please make the distinction (Score:2, Informative)
Re:We should be careful of this.... (Score:2, Informative)
People have been trying to factor large numbers for a long time, and it's a difficult problem.
Merry Christmas! (or as they say at the NSA: qp93eywufaldksvnh)
Re:Sweeden uses a similar token system (Score:2, Informative)
Re:Banks are the problem (Score:5, Informative)
Now, understand that banks will use your information any way they can in-house, manipulate numbers and deposit totals and anything else analytical so they can sell a credit card or a loan (its called cross-selling). But what they cannot do is give your information to other 3rd parties without your direct consent unless its under federal mandate and/or decree (read: court order and/or the Patriot act).
Now this is all fine and good, but when you do something substantial with your money and/or your financial outlook (say, investing or buying a home), you open up yourself to offers from 3rd parties. You sign a document saying so.
Now the easiest thing is, before you sign something, ask them which companies are going to be behind this new venture. Whether it be an investing house (a lot of banks will farm out investing to a subsidiary and get kickbacks on it) or mortgages (who owns this loan? Can they sell it to a 3rd party mortgage company at a later date?), you need to simply be aware.
Feel free to google "Bank Privacy" and read up on the hometown banks and the big boys: They all pretty much say the same thing. If they are under FDIC (for banks) or NCUA (for credit unions), they all fall under the same guidelines: Your information cannot be shared unless you say so. The federal privacy statements which are mandatory to be handed out upon opening an account, etc, say the same thing.
Offshore data management services is simply a scarier way of saying Disaster Recovery. You want your bank to keep running even if the home office (or data center) explodes, right? Then don't start bitching about them backing up data in different places.
Re:Heh? This is old news (Score:3, Informative)
SEB uses VASCO SecureID tokens (Score:4, Informative)
The system that the grandparent describes is based on VASCO [vasco.com] "Digipass" devices, that work just like the RSA secureid tokens, only that they also support PINs and challenge/response authentication. That means that if everything is done correctly (which I can't swear to) these tokens, which SEB have been using for more than five years, are considerably more secure than the normal RSA SecureID.
Basically (very simplified) your normal SecureID will create a checksum from a secret and the current time, so the server can verify that person logging in is holding the token at this time. The Digipass, on the other hand, creates a checksum of the secret, the time, and the challenge from the server. This verifies that the person logging in has access to the token at this time, and created a checksum for this particular log in. And the fact that it also requires a personalized PIN to access the device means that stealing it will do you little good.
Re:Banks are the problem (Score:4, Informative)
The thing is, every 3 months or so they send a new copy of the (slightly modified) privacy agreement and if you don't send them another letter saying don't share my info, they consider it acceptance of the 'new' policy.
Re:We should be careful of this.... (Score:2, Informative)
AES was not written in the US - so it is highly unlikely that US banks would adopt it as a first solution. Keep in mind the only US organization (NSA) that can truly say whether or not it is breakable will not say.
Same goes for eliptical curves - they (NSA) will definetly say not all curves are secure - but they will not say which ones and why, but I doubt if you will see eliptical curves in any military applications in the future.
Neither of these are possible choices for US banks.
I have sat in these meetings between banks and NSA - and the banks are in quite a bind - they know they need to move past DES, but NSA won't tell them anything classified - so they have to put their foot out looking for the landmines on their own. Then NSA pipes up and shakes their head "no" when the do something wrong, which so far is everything. So what are the banks to do? My bet is they do eventually end up with AES, but after a couple of false starts.
Re:SecurID vs. Smart Cards (Score:3, Informative)
SecurID tokens use AES, not RSA algorithm (Score:3, Informative)
Like most other response-only tokens, the authentication is based not on large primes like public-key authentication but rather on a shared secret (one embedded in the token, the other stored on the authentication server.
Much work has been done towards cryptanalysis of response-only tokens, and a well-designed authentication system is very difficult to break blindly, just from observation of a few response pairs. There have been potentially successful attacks proposed against the old SecurID tokens due to a "vanishing differential" problem with certain seed values, but no proof of concept against that has succeeded, and the new AES tokens should not be vulnerable. More on this is available from the SecurID Users group [yahoo.com].
As a counter-example, the old X9.9 challenge-response authentication system was based on DES encryption, and was not well-designed, was fatally flawed. Observation of a handful of challenges and responses cojuld allow an attacker to determine the seed value and compromise the authenticator.
Open source securid-like tokens. (Score:3, Informative)
Have you looked at GNU SASL [gnu.org] (Simple Authentication and Security Layer framework)?
An open source implementation of the SecurID time-based authentication algorithm is not possible because RSA holds several patents covering their whole time-based authentication scheme. The closest solution in the open-source world might be OPIE (formerly S/Key). OpenBSD and other operating systems include S/Key support in the base OS.There are OPIE calculators for MD4/MD5 in Java and for most handhelds, but it is tough to find a SHA-1 or RMD-160 implemention, and I have yet to run across any dedicated hardware device that does nothing but handle OPIE authentication. With the uncertainty about SHA-1, You might plan to implement only RMD-160 (160 bit Ripe Message Digest). Tokens would need a bit more CPU power to handle a few hundred rounds, but at least there is a good chance that RMD will still be a viable hash, long after SHA-1 falls.
HBCI and GnuCash (Score:2, Informative)
German banks use DES and RSA keys on chipcards for years. Together, they developed the Homebanking Computer Interface (HBCI) and the FinTS - Financial Transaction Services: http://www.hbci-zka.de/english/index.htm/ [hbci-zka.de]
It works like a charm with http://www.gnucash.org/ [gnucash.org]. I just insert my chipcard into my reader and can do as many transactions as I want without the hassle of PIN/TAN crap and have a fully working financial solution for my everyday need.
Re:Heh? This is old news (Score:3, Informative)
Re:Yes, it IS different... (Score:2, Informative)
A CR system can take multiple inputs (one of which could be a hash of your transaction data)
making the response unique to the transaction.
SecurID uses a simple token that is not unique to the transaction and so is very vulnerable to man-in-the-middle attacks.
Broken as everyone knows (Score:1, Informative)