SlideShare a Scribd company logo
Two Factor Authentication
Submitted by:
Dilip Kumar Jangir
Roll No.:12EARIT019
Submitted to:
Er. Amit Kumar Nayak
Index
1. Authentication
2. Authentication Factors
• Need of 2FA
• OTP3. 2 Factor Authentication
4. 2FA Using OTP Hard Tokens
5. 2FA Using Mobile Tokens
6. Response Mechanism
7. Business Benefits
8. Conclusion & Recommendations
Authentication
Authentication
• Authentication is the process of verifying the
identity of user.
• The most common technique to authenticate
a user is to use username and password.
Authentication Factors
Authentication Factors
Something you know
Something you have
Something you are
Two Factor Authentication
Two Factor Authentication
• It is an approach to authentication which
requires the presentation of two different
kinds of evidence that someone is who they
say they are.
Need of 2FA
• Social Engineering
• Phishing
• Brute Force Attacks
• Shoulder Surfing
• Keystroke Logging
• Eavesdropping
• Dictionary Attacks
OTP
Software – OTP
An one-time password (OTP) generated by
the company and sent to your mobile
phone or PC.
Hardware – OTP
An OTP generated by a security
device/token. You press the button on the
security device/token to obtain the OTP.
Event Based OTP
Here the moving factor is triggered by an
event
Time Based OTP
Here the moving factor is time.
OTP is a second layer of
security to verify your
identity.
2FA Using Hard Tokens
2F Using Hard Tokens
• Hardware token is a key fob which is typically
carried on your key ring and displays a
pseudo-random number that changes
periodically.
2F Using Hard Tokens cont…
Security Analysis
Benefits
 It is secure against packet
replay attacks.
 It prevents against
phishing.
 Threats
 User needs to carry the
device everywhere, and
there is a risk that it may
get stolen or lost.
 Cost is very high.
 Vulnerable to active
attacks and Man in the
middle attacks

2FA Using Mobile Tokens
2FA Using Mobile Tokens
• This moves the second factor to ‘something
you are’ or ‘something about your behaviour’.
• It makes use of:
– Application installed on user’s mobile
– IMEI
– Time Stamp
– Seed
• Time based One Time Password Algorithm is
used.
How Mobile Token 2FA Works?
•Seed
•Pin
•IMEI number
•Time Stamp
difference
Mobile
Application
Mobile
Application
Auth Server
• User Registration on server
How Mobile Token 2FA Works?
Same Seed
Algorithm
Time
Seed
Algorithm
Time
Seed
159759 159759
Same Time
Same OTP
Mobile
Application
Authentication
Server
• OTP Generation:
Security Analysis
Benefits
 A relatively cheaper and
flexible means of OTP.
 User just need to carry
their mobiles with them,
no extra device is needed.
 Threats
 Still vulnerable to
active attacks
 Man in the middle
attacks
 Man in the browser
attacks

Response Mechanism
Response Mechanism
• For fund transfer
transactions, the server
generates a code and
sends to the user. The user
enters the code provided
to the Internet banking site
in order to commit the
transaction. Challenges:
•High Cost required
•Hardware required
SMS with Transaction Details
Security Analysis
• Threat
– Mobile is now single point of failure. OTP is
generated/ received on mobile and the
verification code of transaction is also received via
sms on mobile. If attacker has the possession of
user’s mobile, then he can do everything.
• Recommendation
– It is necessary that a different medium is used for
receiving OTP and receiving transaction
verification code.
Business Benefits
Business Benefits…
Customer
Confidence
Regulations &
Best Practices
EFT ACT
2007
PCI DSS
NIST
Threat
Prevention
Phishing and
Packet Replay
and Man in
the middle
attacks
Fraud
Prevention
Conclusion &
Recommendations
Recommendations…
• User should check and make sure the website has
https in the URL, so that the password goes
encrypted while transmission.
• The OTP and PIN should be hashed before
sending.
• Mutual authentication should be established
between the client and the server before the
session starts to ensure the user that server can
be trusted.
• Using split key technique for authentication.
Conclusion says…
Method Threats Effective Against Man in
the Browser attack?
Static Passwords Can be lost and easily
obtained
Brute force attacks
possible
No
Biometric No
OTP Hard Tokens User has to carry the
token
No
OTP Soft/ Mobile Token Man in the middle attacks No
OTP with Signature
(Challenge Response)
Secure against man in the
middle attacks
Yes, but inconvenient
OTP with SMS Transaction
Detail
Secure against Phishing,
Packet Replay, MIM and
MITM
Yes!!
Thank You

More Related Content

PPTX
Two factor authentication presentation mcit
PPTX
Two factor authentication 2018
PPTX
Two Factor Authentication
PDF
3 reasons your business can't ignore Two-Factor Authentication
PPTX
User authentication
 
PPTX
Two factor authentication.pptx
PPTX
Password Attack
PPTX
Multifactor Authentication
Two factor authentication presentation mcit
Two factor authentication 2018
Two Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
User authentication
 
Two factor authentication.pptx
Password Attack
Multifactor Authentication

What's hot (20)

PDF
What is two factor or multi-factor authentication
PPTX
Cybersecurity Awareness Overview.pptx
PDF
Mobile Security
PPT
Cyber Crime and Security
PPTX
Application security
PPTX
Social engineering
PPTX
Cyber crime.pptx
PPTX
Mobile Device Security
PDF
Network Security Presentation
PPTX
Advanced cryptography and implementation
PPTX
Cyber security
PPTX
Cyber security
PPTX
Guide to MFA
PPTX
Cybercrime and Security
PPTX
Cyber security
PPTX
Smart Card Security
PDF
Cyber security
PPTX
2FA Protocol Presentation
PDF
Password Management
PDF
Cyber Security Vulnerabilities
What is two factor or multi-factor authentication
Cybersecurity Awareness Overview.pptx
Mobile Security
Cyber Crime and Security
Application security
Social engineering
Cyber crime.pptx
Mobile Device Security
Network Security Presentation
Advanced cryptography and implementation
Cyber security
Cyber security
Guide to MFA
Cybercrime and Security
Cyber security
Smart Card Security
Cyber security
2FA Protocol Presentation
Password Management
Cyber Security Vulnerabilities
Ad

Viewers also liked (20)

PPTX
Two Factor Authentication: Easy Setup, Major Impact
PPT
Simple Two Factor Authentication
PDF
Two-factor Authentication
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
PPTX
Azure API Management
PPTX
Ing voice biometrics nuance
PDF
"2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre...
PDF
Google Authenticator, possible attacks and prevention
PPT
Jasig Central Authentication Service in Ten Minutes
PDF
2013.devcon3 liferay and google authenticator integration rafik_harabi
PDF
Two factor authentication-in_your_network_e_guide
PDF
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
PDF
Two Factor Authentication and You
PDF
Voice Biometrics - how to recognize a speaker.
PPTX
API Management Part 1 - An Introduction to Azure API Management
PDF
Securing Your Salesforce Deployment with Two Factor Authentication
PDF
Two factor authentication
PDF
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
PDF
2 factor authentication 3 [compatibility mode]
PDF
FIDO U2F Specifications: Overview & Tutorial
Two Factor Authentication: Easy Setup, Major Impact
Simple Two Factor Authentication
Two-factor Authentication
Combat the Latest Two-Factor Authentication Evasion Techniques
Azure API Management
Ing voice biometrics nuance
"2Fac: Facebook's internal multi-factor authentication". Tim Tickel, Chad Gre...
Google Authenticator, possible attacks and prevention
Jasig Central Authentication Service in Ten Minutes
2013.devcon3 liferay and google authenticator integration rafik_harabi
Two factor authentication-in_your_network_e_guide
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
Two Factor Authentication and You
Voice Biometrics - how to recognize a speaker.
API Management Part 1 - An Introduction to Azure API Management
Securing Your Salesforce Deployment with Two Factor Authentication
Two factor authentication
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
2 factor authentication 3 [compatibility mode]
FIDO U2F Specifications: Overview & Tutorial
Ad

Similar to Seminar-Two Factor Authentication (20)

PDF
Transecq ITA
PDF
A secure communication in smart phones using two factor authentication
PDF
A secure communication in smart phones using two factor authentications
PDF
How to Implement Website Authentication By MyOtpApp
PDF
120 i143
PDF
Two Factor Authentication Using Smartphone Generated One Time Password
PDF
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
PDF
Effective 2FA - Part 1: the technical stuff
PDF
Two aspect authentication system using secure
PDF
Two aspect authentication system using secure
PDF
Jips v07 no1_paper17_2
PDF
Jips v07 no1_paper17_3
PDF
Securing corporate assets_with_2_fa
PPTX
Passwords are passé. WebAuthn is simpler, stronger and ready to go
PPT
10 1 otp all
PDF
IRJET- Multi sharing Data using OTP
PDF
Two-Steps to Owning MFA
PDF
Enhanced adaptive security system for SMS – based One Time Password
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
apidays London 2023 - Building Multi-Factor Authentication into your applicat...
Transecq ITA
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentications
How to Implement Website Authentication By MyOtpApp
120 i143
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Effective 2FA - Part 1: the technical stuff
Two aspect authentication system using secure
Two aspect authentication system using secure
Jips v07 no1_paper17_2
Jips v07 no1_paper17_3
Securing corporate assets_with_2_fa
Passwords are passé. WebAuthn is simpler, stronger and ready to go
10 1 otp all
IRJET- Multi sharing Data using OTP
Two-Steps to Owning MFA
Enhanced adaptive security system for SMS – based One Time Password
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
apidays London 2023 - Building Multi-Factor Authentication into your applicat...

Seminar-Two Factor Authentication

  • 1. Two Factor Authentication Submitted by: Dilip Kumar Jangir Roll No.:12EARIT019 Submitted to: Er. Amit Kumar Nayak
  • 2. Index 1. Authentication 2. Authentication Factors • Need of 2FA • OTP3. 2 Factor Authentication 4. 2FA Using OTP Hard Tokens 5. 2FA Using Mobile Tokens 6. Response Mechanism 7. Business Benefits 8. Conclusion & Recommendations
  • 4. Authentication • Authentication is the process of verifying the identity of user. • The most common technique to authenticate a user is to use username and password.
  • 6. Authentication Factors Something you know Something you have Something you are
  • 8. Two Factor Authentication • It is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are.
  • 9. Need of 2FA • Social Engineering • Phishing • Brute Force Attacks • Shoulder Surfing • Keystroke Logging • Eavesdropping • Dictionary Attacks
  • 10. OTP Software – OTP An one-time password (OTP) generated by the company and sent to your mobile phone or PC. Hardware – OTP An OTP generated by a security device/token. You press the button on the security device/token to obtain the OTP. Event Based OTP Here the moving factor is triggered by an event Time Based OTP Here the moving factor is time. OTP is a second layer of security to verify your identity.
  • 11. 2FA Using Hard Tokens
  • 12. 2F Using Hard Tokens • Hardware token is a key fob which is typically carried on your key ring and displays a pseudo-random number that changes periodically.
  • 13. 2F Using Hard Tokens cont…
  • 14. Security Analysis Benefits  It is secure against packet replay attacks.  It prevents against phishing.  Threats  User needs to carry the device everywhere, and there is a risk that it may get stolen or lost.  Cost is very high.  Vulnerable to active attacks and Man in the middle attacks 
  • 16. 2FA Using Mobile Tokens • This moves the second factor to ‘something you are’ or ‘something about your behaviour’. • It makes use of: – Application installed on user’s mobile – IMEI – Time Stamp – Seed • Time based One Time Password Algorithm is used.
  • 17. How Mobile Token 2FA Works? •Seed •Pin •IMEI number •Time Stamp difference Mobile Application Mobile Application Auth Server • User Registration on server
  • 18. How Mobile Token 2FA Works? Same Seed Algorithm Time Seed Algorithm Time Seed 159759 159759 Same Time Same OTP Mobile Application Authentication Server • OTP Generation:
  • 19. Security Analysis Benefits  A relatively cheaper and flexible means of OTP.  User just need to carry their mobiles with them, no extra device is needed.  Threats  Still vulnerable to active attacks  Man in the middle attacks  Man in the browser attacks 
  • 21. Response Mechanism • For fund transfer transactions, the server generates a code and sends to the user. The user enters the code provided to the Internet banking site in order to commit the transaction. Challenges: •High Cost required •Hardware required
  • 23. Security Analysis • Threat – Mobile is now single point of failure. OTP is generated/ received on mobile and the verification code of transaction is also received via sms on mobile. If attacker has the possession of user’s mobile, then he can do everything. • Recommendation – It is necessary that a different medium is used for receiving OTP and receiving transaction verification code.
  • 25. Business Benefits… Customer Confidence Regulations & Best Practices EFT ACT 2007 PCI DSS NIST Threat Prevention Phishing and Packet Replay and Man in the middle attacks Fraud Prevention
  • 27. Recommendations… • User should check and make sure the website has https in the URL, so that the password goes encrypted while transmission. • The OTP and PIN should be hashed before sending. • Mutual authentication should be established between the client and the server before the session starts to ensure the user that server can be trusted. • Using split key technique for authentication.
  • 28. Conclusion says… Method Threats Effective Against Man in the Browser attack? Static Passwords Can be lost and easily obtained Brute force attacks possible No Biometric No OTP Hard Tokens User has to carry the token No OTP Soft/ Mobile Token Man in the middle attacks No OTP with Signature (Challenge Response) Secure against man in the middle attacks Yes, but inconvenient OTP with SMS Transaction Detail Secure against Phishing, Packet Replay, MIM and MITM Yes!!