Cryptology ePrint Archive: Report 2015/609

Experimental Study of DIGIPASS GO3 and the Security of Authentication

Igor Semaev

Abstract: Based on the analysis of $6$-digit one-time passwords(OTP) generated by DIGIPASS GO3 we were able to reconstruct the synchronisation system of the token, the OTP generating algorithm and the verification protocol in details essential for an attack. The OTPs are more predictable than expected. A forgery attack is described. We argue the attack success probability is $8^{-5}$. That is much higher than $10^{-6}$ which may be expected if all the digits are independent and uniformly distributed. Under natural assumptions even in a relatively small bank or company with $10^4$ customers the number of compromised accounts during a year may be more than $100$.

Category / Keywords: cryptographic protocols / authentication codes

Date: received 20 Jun 2015

Contact author: igor at ii uib no

Available format(s): PDF | BibTeX Citation

Version: 20150628:193000 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]