[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Australian "calculatorcard"
On Mon, 1 Jan 1996, amp wrote:
> DS> I'd think you could have the server safely accept # N, N-60 sec, and
> DS> N+60 seconds; and adjust the server's idea of your card's clock speed
> DS> from that.
>
> DS> What new risk would that create?
>
> i would figure the server would give a minute or so for slippage.
> basically the risk is that it would give someone 3 minutes to do a
> brute force attack rather than one. if you have decent security on
> the server side, i.e., disallow the card for 5 minutes or more after 3
> or so failed attempts, brute attacks would be minimized. however, if
> the actual window for a single code is 3 minutes, that increases your
> chance of hitting it as 3 separate numbers would be valid for a given
> card at any given time.
>
START <attila>
Bank wire systems over the SWIFT private wire are time synched
much closer than a minute although I have never been given more of
an answer than that.
given that you have a tolerable high speed link, and are not
dealing with an overloaded concentrator at the telco -> carrier
inferface or an overloaded server, I believe you can solve most
of the windowing problem by:
1. client sends number and time to server
2. server send what it thinks as time to client
3. client can place a delta on servers time for local time
4. enter PIN, etc. and you are working with a much narrower
window.
the security risk does not appear to increase from the
exchange times and entering the PIN and letting the normal
progression go forward once v. just monitoring a series of
successive verifications trying to effect a pattern in the
hash.
Secure-ID seems to be a one-time time-based single use
pad; to me, using a time exchange initiator has the advantage
of a smaller window, and fewer problems with client machines
running on strange times which require sloppier time windows.
END <attila>