Early Yubikeys used an internal
counter to generate codes in a
similar fashion.
https://static1.squarespace.com/static/54764dcde4b0ad59b84ad859/t/
54eccc9ce4b0328389b9b398/1424805028325/YubiKey-Standard-1030x687.png?
format=1500w
Slide 64
Slide 64 text
These are all
still vulnerable to phishing
Slide 65
Slide 65 text
As the code generator works
independently, it cannot verify
the website’s identity
Slide 66
Slide 66 text
Challenge-Response protocols
fix this issue
Slide 67
Slide 67 text
The Chip Authentication Program
is used by several UK banks to verify
transfers to new recipients
https://www.barclays.co.uk/cs/Satellite?
blobcol=urldata&blobkey=id&blobtable=MungoBlobs&blobwhere=1367516798251&ssbin
ary=true
Slide 68
Slide 68 text
No content
Slide 69
Slide 69 text
The Chip Authentication Program
piggybacks the Chip and PIN process
to generate an eight digit code
Slide 70
Slide 70 text
(Barclays UK Debit Card issued in 2015. Inspected using Cardpeek.)
EMV-wide payment
card application selector
Visa Debit application,
used for most transactions.
Link application,
used by UK-only ATMs.
CAP application,
used by online banking login.
Slide 71
Slide 71 text
After verifying the user’s PIN, the
authenticator asks the card to sign a
fake purchase
Slide 72
Slide 72 text
The cryptogram from this fake
transaction is encoded as a token
which can be verified by your bank
Slide 73
Slide 73 text
Phishing attacks are useless as the
user has to independently confirm
the amount and account number
Slide 74
Slide 74 text
What if we’d like to verify
the domain name?
Slide 75
Slide 75 text
Some organisations (notably US DoD)
have deployed PKCS#11 smartcards
https://images-na.ssl-images-amazon.com/images/I/61rdJCNG5nL._SX355_.jpg
Slide 76
Slide 76 text
PKCS#11 smartcards have a limited
number of identities and are
generally unsuitable for use outwith
their issuing organisation
Slide 77
Slide 77 text
U2F tries to be a modern version
of PKCS#11 client authentication
certificates