Leveraging personal devices for stronger password authentication from untrusted computers
Internet authentication for popular end-user transactions, such as online banking and e-commerce, continues to be dominated by passwords entered through end-user PCs. Most users continue to prefer (typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related to keyboard and screen size. However, most such transactions and their underlying protocols are vulnerable to attacks including keylogging, phishing and pharming. We propose Mobile Password Authentication (MP-Auth) to counter such attacks, which cryptographically separates a user's long-term secret input from the client PC, and offers transaction integrity. The PC continues to be used for most of the interaction but has access only to temporary secrets, while the user's long-term secret is input through an independent personal device, e.g., a cellphone which makes it available to the PC only after encryption under the intended far-end recipient's public key. MP-Auth expects users to input passwords only to a personal device, and be vigilant while confirming transactions from the device. To facilitate a comparison to MP-Auth, we also provide a comprehensive survey of web authentication techniques that use an additional factor of authentication; this survey may be of independent interest.
|Keywords||Password authentication, personal device, phishing, session hijacking, untrusted computers|
|Journal||Journal of Computer Security|
Mannan, M. (Mohammad), & Van Oorschot, P. (2011). Leveraging personal devices for stronger password authentication from untrusted computers. Journal of Computer Security, 19(4), 703–750. doi:10.3233/JCS-2010-0412