Cryptology ePrint Archive: Report 2015/609
Experimental Study of DIGIPASS GO3 and the Security of Authentication
Igor Semaev
Abstract: Based on the analysis of $6$-digit one-time passwords(OTP) generated by DIGIPASS GO3 we were able to reconstruct the synchronisation system of the token, the OTP generating algorithm and the verification protocol in details essential for an attack. The OTPs are more predictable than expected. A forgery attack is described. We argue the attack success probability is $8^{-5}$. That is much higher than $10^{-6}$ which may be expected if all the digits are independent and uniformly distributed. Under natural assumptions even in a relatively small bank or company with $10^4$ customers the number of compromised accounts during a year may be more than $100$.
Category / Keywords: cryptographic protocols / authentication codes
Date: received 20 Jun 2015
Contact author: igor at ii uib no
Available format(s): PDF | BibTeX Citation
Version: 20150628:193000 (All versions of this report)
Short URL: ia.cr/2015/609
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]