SlideShare a Scribd company logo
SMS-based Two-Factor
Authentication
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 1 of 11
Risk analysis
Disclaimer
Disclaimer of Warranties and Limitation of Liabilities
All information contained in this document is provided 'as is'; VASCO Data Security
assumes no responsibility for its accuracy and/or completeness.
In no event will VASCO Data Security be liable for damages arising directly or
indirectly from any use of the information contained in this document.
Copyright
© VASCO Data Security 2005. All rights reserved.
Trademarks
DIGIPASS and VACMAN are trademarks of VASCO Data Security.
All other trademarks are trademarks of their respective owners.
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 2 of 11
Table of Contents
Disclaimer ...................................................................................................... 2
Table of Contents............................................................................................ 3
Reference guide....................................................... Error! Bookmark not defined.
1 Introduction.............................................................................................. 5
2 SMS-based two-factor authentication ....................................................... 5
2.1 SMS-based user authentication ............................................................. 6
2.2 SMS-based transaction authentication.................................................... 7
3 Threats ..................................................................................................... 8
3.1 Security............................................................................................. 8
3.1.1 Security of SMS-based user authentication .......................................... 8
3.1.2 Security of SMS-based transaction authentication................................. 9
3.2 Reliability......................................................................................... 11
3.3 Cost ................................................................................................ 11
4 Conclusion .............................................................................................. 11
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 3 of 11
Document history
Version Author Comments Date
1.0 Frederik Mennes Creation of document October 17, 2005
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 4 of 11
1 Introduction
This document analyses the risk associated with deploying SMS-based two-factor
authentication.
Section 2 presents the concept. Section 3 outlines a number of threats. We draw our
conclusions in Section 4.
2 SMS-based two-factor authentication
In this section, we shortly describe the concept of SMS-based two-factor
authentication.
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 5 of 11
2.1 SMS-based user authentication
When a user wants to authenticate himself to the Internet banking application of a
bank, the process goes as follows (see Figure 1):
• The user surfs to the Internet banking application and provides his username
and static password to the application. The application sends username and
password to the banking server. The banking server verifies the
username/password combination. (Steps 1, 2)
• If the combination is valid, it generates a one-time password. The banking
server sends this one-time password to the user via an SMS-message. (Steps
3, 4, 5)
• Upon receipt of the SMS-message, the user provides the Internet banking
application with the one-time password. The application sends this one-time
password to the banking server. (Steps 6, 7)
• The banking server verifies whether or not the one-time password provided by
the user matches the password it has sent out. If this is the case, the user has
successfully been authenticated. (Step 8)
Figure 1: SMS-based user authentication
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 6 of 11
2.2 SMS-based transaction authentication
We assume here that the user has successfully logged into the Internet banking
application. When a user subsequently wants to sign the data of a financial
transaction, the process goes as follows (see also Figure 2 below).
• The user enters the data of the financial transaction (e.g. amount, account)
into the Internet banking application. The application sends this data to the
banking server. (Steps 1, 2)
• The banking server generates a signature and sends this signature, together
with the transaction data, to the user via an SMS-message. (Steps 3, 4)
• Upon receipt of the SMS-message, the user verifies whether or not the data in
the SMS-message match his transaction data. If they match, the user provides
the Internet banking application with the signature and transaction data. The
application sends this signature to the banking server. (Steps 5, 6, 7)
The banking server verifies whether or not the signature provided by the user matches
the signature it has sent out. If this is the case, the financial transaction is conducted.
Figure 2: SMS-based transaction authentication
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 7 of 11
3 Threats
3.1 Security
3.1.1 Security of SMS-based user authentication
Following attacks are possible against SMS-based user authentication as described
above :
• Eavesdropping. SMS-based two-factor authentication systems are
characterized by the fact that the end-user does not control the generation of
the one-time password. On the contrary, it is the bank that provides the user
with the one-time password. This delivery process may give rise to a weak link
in the authentication system, because several entities can eavesdrop on the
communication link between bank and end-user. The eavesdropper can then
use the one-time password himself, effectively impersonating the genuine user.
o Members of staff of the bank can learn the one-time password.
o The link between bank and operator can be eavesdropped.
o Members of staff of the telecom operator can learn the one-time
password.
o The link between operator and user can be eavesdropped (only the link
from the base station to the mobile phone is encrypted in case of GSM).
• Man-in-the-middle attack. An adversary can lure a user to a fake web site,
and have the user disclose its username/password/one-time password. When
the user authentication has been performed, the adversary hijacks the banking
session, conducting transactions on behalf of the user. This is a real-time
phishing/pharming attack, where the adversary monitors the traffic between
bank and user.
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 8 of 11
3.1.2 Security of SMS-based transaction authentication
An adversary can conduct man-in-the-middle attacks against SMS-based transaction
authentication. We differentiate between two types of man-in-the-middle attacks.
A) Adversary controls traffic between user’s PC and bank
A number of different man-in-the-middle attacks are possible, depending on the
nature of the signature:
• Signature is random number. Suppose that the signature is a random
number. The adversary watches the traffic between the banking server and the
user. When the user has entered the signature into the banking application, the
adversary changes the transaction data (e.g. amount, account). If the banking
server does not check the data again, the adversary’s transaction will be
executed.
• Signature is hash. Suppose that the signature is actually a hash of the
transaction data, computed using, for example, SHA-1, SHA-2, RIPEMD-160,
etc. Suppose also that the adversary learns which hash function is used to
compute the hash values. When the user has entered the signature into the
banking application, the adversary changes the transaction data (e.g. amount,
account) and hash. If the banking server only checks whether or not the data
and signature match, the adversary’s transaction will be executed.
• Signature is Message Authentication Code (MAC). Suppose that the
signature is actually a MAC of the transaction data, computed using a secret
key. In this case, the adversary is not able to compute matching data/signature
pairs of his own, because he does not possess the secret key.
Figure 3
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 9 of 11
In order to protect against these attacks, we have following recommendations:
• Do NOT use random numbers as signatures.
• Do NOT use hash values as signatures.
• Do use Message Authentication Codes (MAC’s) as signatures.
• Do verify whether the submitted signature matches the received signature.
• In Step 7, send only the signature, and not the transaction data, or verify
whether or not the transaction data are always the same.
B) Adversary controls traffic between user’s PC and bank and between bank
and mobile phone
In this case, the adversary can launch very powerfull attacks. When a user submits a
transaction, the adversary hijacks the session between user and bank. He then
changes the transaction data at his will, and submits the new transaction. The bank
generates a signature and sends an SMS-message to the genuine user. However, the
adversary intercepts the SMS-message and conducts his transaction.
This type of fraud can typically be conducted by members of staff of the telecom
operator, as they have full control over the SMS-messages. However, an adversary
can also conduct this type of attack if he intercepts the traffic between bank and
operator or between the operator and the mobile phone.
Figure 4
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 10 of 11
3.2 Reliability
Following factors influence the reliability of SMS-based two-factor authentication.
• SMS delay and loss. According to a study of KeyNote Systems, Inc.
(http://www.keynote.com), an average of 94.7 % of SMS-messages arrive at
their destination in an average of 11.8 seconds. This means that 5.3 % of the
messages arrives late or does not arrive at all. As an example, if you have
100,000 customers requesting one SMS-message per week, 5300 messages
will arrive late or get lost every week.
• Coverage. In order to receive an SMS-message, one has to be in an area with
coverage for cellular phones. If this is not the case, it is not possible to conduct
an Internet banking session.
• User acceptance. Not everyone has a cellular phone, and not everybody
knows how to read SMS-messages.
3.3 Cost
• Sending SMS-messages to customers comes with a certain cost. The cost per
SMS-message is dependent on the local mobile phone operator, but $0.10
might be a possible average.
• Moreover, the cost of sending SMS-messages is ever-increasing, hence not
fixed. For example, if a customer requests one SMS-message per week, this
would cost already $5 per year if an SMS-message costs $0.10.
Users might not be happy to pay for this cost.
4 Conclusion
It is up to the bank to assess the potential impact of the threats presented above. The
bank then has to decide whether or not the risk is acceptable.
SMS-based Two-Factor Authentication - Risk analysis
© 2005 VASCO Data Security. All rights reserved. Page 11 of 11

More Related Content

PDF
Securing corporate assets_with_2_fa
PDF
Session 7 e_raja_kailar
PDF
Sp 29 two_factor_auth_guide
PDF
M-Pass: Web Authentication Protocol
PDF
Two factor authentication
PDF
Two factor authentication-in_your_network_e_guide
PDF
Pg 2 fa_tech_brief
PDF
120 i143
Securing corporate assets_with_2_fa
Session 7 e_raja_kailar
Sp 29 two_factor_auth_guide
M-Pass: Web Authentication Protocol
Two factor authentication
Two factor authentication-in_your_network_e_guide
Pg 2 fa_tech_brief
120 i143

What's hot (18)

PDF
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
PDF
An Overview on Authentication Approaches and Their Usability in Conjunction w...
PDF
Security Analysis of Mobile Authentication Using QR-Codes
PDF
Mobile authentication
PDF
An Enhanced Security System for Web Authentication
PPTX
Webinar - Easy multi factor authentication strategies and PCI DSS
PDF
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
PDF
Iaetsd fpga implementation of rf technology and biometric authentication
PDF
Stronger/Multi-factor Authentication for Enterprise Applications
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
PDF
App Authentication
PPTX
Access management
PPT
E-Banking Web Security
PDF
76 s201923
PDF
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
PDF
A secure communication in smart phones using two factor authentications
PDF
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
PDF
Two Factor Authentication Using Smartphone Generated One Time Password
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
Security Analysis of Mobile Authentication Using QR-Codes
Mobile authentication
An Enhanced Security System for Web Authentication
Webinar - Easy multi factor authentication strategies and PCI DSS
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
Iaetsd fpga implementation of rf technology and biometric authentication
Stronger/Multi-factor Authentication for Enterprise Applications
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
App Authentication
Access management
E-Banking Web Security
76 s201923
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
A secure communication in smart phones using two factor authentications
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
Two Factor Authentication Using Smartphone Generated One Time Password
Ad

Similar to Sms based otp (20)

PDF
A Secure Protocol For End To End Security To SMS Banking
PPSX
Welcome to the 3rd generation in user authentication
PDF
Boosting Customer Engagement with Transactional SMS API: A Complete Guide
PDF
Detection and Prevention of security vulnerabilities associated with mobile b...
PDF
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
PDF
Bq33413420
PDF
Bq33413420
PDF
Cryptomathic white paper 2fa for banking
PDF
PDF
Move your customer authentication to the next level!
PDF
5.[25 33]survey on 2-step security for authentication in m-banking
PDF
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
PDF
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
PDF
Transecq ITA
PDF
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...
PPTX
Internet banking safeguards vulnerabilities - OWASP AppSec EU 2016
DOC
87559489 auth
PPTX
Seminar-Two Factor Authentication
DOC
DOC
status
A Secure Protocol For End To End Security To SMS Banking
Welcome to the 3rd generation in user authentication
Boosting Customer Engagement with Transactional SMS API: A Complete Guide
Detection and Prevention of security vulnerabilities associated with mobile b...
CONFidence 2014: Arkadiusz Bolibok,Paweł Goleń: Evaluation of Transactional C...
Bq33413420
Bq33413420
Cryptomathic white paper 2fa for banking
Move your customer authentication to the next level!
5.[25 33]survey on 2-step security for authentication in m-banking
Mahindra Represented at The Mobile VAS SUMMIT 2009 by Virtue Insight
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
Transecq ITA
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...
Internet banking safeguards vulnerabilities - OWASP AppSec EU 2016
87559489 auth
Seminar-Two Factor Authentication
status
Ad

More from Hai Nguyen (20)

PDF
Scc soft token datasheet
PDF
Rsa two factorauthentication
PDF
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
PDF
Ouch 201211 en
PDF
N ye c-rfp-two-factor-authentication
PDF
Multiple credentials-in-the-enterprise
PDF
Ijcsi 9-4-2-457-462
PDF
Identity cues two factor data sheet
PDF
Hotpin datasheet
PDF
Gambling
PDF
Ds netsuite-two-factor-authentication
PDF
Datasheet two factor-authenticationx
PDF
Csd6059
PDF
Citrix sb 0707-lowres
PDF
Bi guardotp
PDF
Attachment 1 – mitigation measures for two factor authentication compromise
PDF
Ams 2 fa april 2013
PDF
10695 sidtfa sb_0210
PDF
9697 aatf sb_0808
PDF
2012 1 wp securit trustbuilder two-factor authentication
Scc soft token datasheet
Rsa two factorauthentication
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Ouch 201211 en
N ye c-rfp-two-factor-authentication
Multiple credentials-in-the-enterprise
Ijcsi 9-4-2-457-462
Identity cues two factor data sheet
Hotpin datasheet
Gambling
Ds netsuite-two-factor-authentication
Datasheet two factor-authenticationx
Csd6059
Citrix sb 0707-lowres
Bi guardotp
Attachment 1 – mitigation measures for two factor authentication compromise
Ams 2 fa april 2013
10695 sidtfa sb_0210
9697 aatf sb_0808
2012 1 wp securit trustbuilder two-factor authentication

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Monthly Chronicles - July 2025
Unlocking AI with Model Context Protocol (MCP)
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Sms based otp

  • 1. SMS-based Two-Factor Authentication SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 1 of 11 Risk analysis
  • 2. Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility for its accuracy and/or completeness. In no event will VASCO Data Security be liable for damages arising directly or indirectly from any use of the information contained in this document. Copyright © VASCO Data Security 2005. All rights reserved. Trademarks DIGIPASS and VACMAN are trademarks of VASCO Data Security. All other trademarks are trademarks of their respective owners. SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 2 of 11
  • 3. Table of Contents Disclaimer ...................................................................................................... 2 Table of Contents............................................................................................ 3 Reference guide....................................................... Error! Bookmark not defined. 1 Introduction.............................................................................................. 5 2 SMS-based two-factor authentication ....................................................... 5 2.1 SMS-based user authentication ............................................................. 6 2.2 SMS-based transaction authentication.................................................... 7 3 Threats ..................................................................................................... 8 3.1 Security............................................................................................. 8 3.1.1 Security of SMS-based user authentication .......................................... 8 3.1.2 Security of SMS-based transaction authentication................................. 9 3.2 Reliability......................................................................................... 11 3.3 Cost ................................................................................................ 11 4 Conclusion .............................................................................................. 11 SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 3 of 11
  • 4. Document history Version Author Comments Date 1.0 Frederik Mennes Creation of document October 17, 2005 SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 4 of 11
  • 5. 1 Introduction This document analyses the risk associated with deploying SMS-based two-factor authentication. Section 2 presents the concept. Section 3 outlines a number of threats. We draw our conclusions in Section 4. 2 SMS-based two-factor authentication In this section, we shortly describe the concept of SMS-based two-factor authentication. SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 5 of 11
  • 6. 2.1 SMS-based user authentication When a user wants to authenticate himself to the Internet banking application of a bank, the process goes as follows (see Figure 1): • The user surfs to the Internet banking application and provides his username and static password to the application. The application sends username and password to the banking server. The banking server verifies the username/password combination. (Steps 1, 2) • If the combination is valid, it generates a one-time password. The banking server sends this one-time password to the user via an SMS-message. (Steps 3, 4, 5) • Upon receipt of the SMS-message, the user provides the Internet banking application with the one-time password. The application sends this one-time password to the banking server. (Steps 6, 7) • The banking server verifies whether or not the one-time password provided by the user matches the password it has sent out. If this is the case, the user has successfully been authenticated. (Step 8) Figure 1: SMS-based user authentication SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 6 of 11
  • 7. 2.2 SMS-based transaction authentication We assume here that the user has successfully logged into the Internet banking application. When a user subsequently wants to sign the data of a financial transaction, the process goes as follows (see also Figure 2 below). • The user enters the data of the financial transaction (e.g. amount, account) into the Internet banking application. The application sends this data to the banking server. (Steps 1, 2) • The banking server generates a signature and sends this signature, together with the transaction data, to the user via an SMS-message. (Steps 3, 4) • Upon receipt of the SMS-message, the user verifies whether or not the data in the SMS-message match his transaction data. If they match, the user provides the Internet banking application with the signature and transaction data. The application sends this signature to the banking server. (Steps 5, 6, 7) The banking server verifies whether or not the signature provided by the user matches the signature it has sent out. If this is the case, the financial transaction is conducted. Figure 2: SMS-based transaction authentication SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 7 of 11
  • 8. 3 Threats 3.1 Security 3.1.1 Security of SMS-based user authentication Following attacks are possible against SMS-based user authentication as described above : • Eavesdropping. SMS-based two-factor authentication systems are characterized by the fact that the end-user does not control the generation of the one-time password. On the contrary, it is the bank that provides the user with the one-time password. This delivery process may give rise to a weak link in the authentication system, because several entities can eavesdrop on the communication link between bank and end-user. The eavesdropper can then use the one-time password himself, effectively impersonating the genuine user. o Members of staff of the bank can learn the one-time password. o The link between bank and operator can be eavesdropped. o Members of staff of the telecom operator can learn the one-time password. o The link between operator and user can be eavesdropped (only the link from the base station to the mobile phone is encrypted in case of GSM). • Man-in-the-middle attack. An adversary can lure a user to a fake web site, and have the user disclose its username/password/one-time password. When the user authentication has been performed, the adversary hijacks the banking session, conducting transactions on behalf of the user. This is a real-time phishing/pharming attack, where the adversary monitors the traffic between bank and user. SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 8 of 11
  • 9. 3.1.2 Security of SMS-based transaction authentication An adversary can conduct man-in-the-middle attacks against SMS-based transaction authentication. We differentiate between two types of man-in-the-middle attacks. A) Adversary controls traffic between user’s PC and bank A number of different man-in-the-middle attacks are possible, depending on the nature of the signature: • Signature is random number. Suppose that the signature is a random number. The adversary watches the traffic between the banking server and the user. When the user has entered the signature into the banking application, the adversary changes the transaction data (e.g. amount, account). If the banking server does not check the data again, the adversary’s transaction will be executed. • Signature is hash. Suppose that the signature is actually a hash of the transaction data, computed using, for example, SHA-1, SHA-2, RIPEMD-160, etc. Suppose also that the adversary learns which hash function is used to compute the hash values. When the user has entered the signature into the banking application, the adversary changes the transaction data (e.g. amount, account) and hash. If the banking server only checks whether or not the data and signature match, the adversary’s transaction will be executed. • Signature is Message Authentication Code (MAC). Suppose that the signature is actually a MAC of the transaction data, computed using a secret key. In this case, the adversary is not able to compute matching data/signature pairs of his own, because he does not possess the secret key. Figure 3 SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 9 of 11
  • 10. In order to protect against these attacks, we have following recommendations: • Do NOT use random numbers as signatures. • Do NOT use hash values as signatures. • Do use Message Authentication Codes (MAC’s) as signatures. • Do verify whether the submitted signature matches the received signature. • In Step 7, send only the signature, and not the transaction data, or verify whether or not the transaction data are always the same. B) Adversary controls traffic between user’s PC and bank and between bank and mobile phone In this case, the adversary can launch very powerfull attacks. When a user submits a transaction, the adversary hijacks the session between user and bank. He then changes the transaction data at his will, and submits the new transaction. The bank generates a signature and sends an SMS-message to the genuine user. However, the adversary intercepts the SMS-message and conducts his transaction. This type of fraud can typically be conducted by members of staff of the telecom operator, as they have full control over the SMS-messages. However, an adversary can also conduct this type of attack if he intercepts the traffic between bank and operator or between the operator and the mobile phone. Figure 4 SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 10 of 11
  • 11. 3.2 Reliability Following factors influence the reliability of SMS-based two-factor authentication. • SMS delay and loss. According to a study of KeyNote Systems, Inc. (http://www.keynote.com), an average of 94.7 % of SMS-messages arrive at their destination in an average of 11.8 seconds. This means that 5.3 % of the messages arrives late or does not arrive at all. As an example, if you have 100,000 customers requesting one SMS-message per week, 5300 messages will arrive late or get lost every week. • Coverage. In order to receive an SMS-message, one has to be in an area with coverage for cellular phones. If this is not the case, it is not possible to conduct an Internet banking session. • User acceptance. Not everyone has a cellular phone, and not everybody knows how to read SMS-messages. 3.3 Cost • Sending SMS-messages to customers comes with a certain cost. The cost per SMS-message is dependent on the local mobile phone operator, but $0.10 might be a possible average. • Moreover, the cost of sending SMS-messages is ever-increasing, hence not fixed. For example, if a customer requests one SMS-message per week, this would cost already $5 per year if an SMS-message costs $0.10. Users might not be happy to pay for this cost. 4 Conclusion It is up to the bank to assess the potential impact of the threats presented above. The bank then has to decide whether or not the risk is acceptable. SMS-based Two-Factor Authentication - Risk analysis © 2005 VASCO Data Security. All rights reserved. Page 11 of 11