Digi-Sign, The Certificate Corporation
Published on Digi-Sign, The Certificate Corporation (http://www2.digi-sign.com)

Home > Alternatives

By Digi-Sign
Created May 20 2010 - 07:22

Alternatives

Choosing between One-Time-Passwords & Digi-Access™
You have an existing, well structured and 'secured' online application. This could be an extranet, portal, online banking, insurance service, medical application or any other online system. Currently, access is controlled and 'protected' by usernames and passwords.


[1]Online Banking Example [1]



For many reasons, this security is no longer sufficient and there are only two credible options available:


One-Time-Password [OTP] Tokens

Digi-Access™ Certificates

In Favour of OTP

  • Widely used & popular

  • End user needs no training

Against using OTP

  • Unless you use Cell-OTP™ [2], you...

    • Will require expensive infrastructure changes

    • Need to physically issue tokens

    • Cannot stop 'man-in-the-middle [3]' attacks

 

In Favour of Digi-Access™

  • Requires no infrastructure changes

  • Simple issuing [4] to end users

  • End user needs no training

  • Protects against 'man-in-the-middle'

  • Implement in three simple steps [5]

  • Can be offered as a security add-on

  • Considerably less expensive

Against using Digi-Access™

  • Not as widely adopted as OTP

  • Concerns about CryptoAPI security [6]


You decide which makes more sense

                • Take the Digi-Access™ Online Demonstration [7]

                • Read the three simple steps [5] to implementing Digi-Access™

                • Then there's the considerable cost savings [8] to take account of



And then let your users decide

Perhaps you don't have any plans to increase the security access to your online application. Budgetary restrictions may be another issue. So why not let your users decide if they want this security 'add-on'.

We have a simple programme for this too:

                • Implement a two-tiered [5] approach

                • And if your users want it, they pay for it (not you)

                • And we'll implement Digi-Access™ for you free-of-charge, on a shared revenue basis

Avail of this ARP Special Offer >> [9]

Man-in-the-Middle Security Issue

How the Man-in-the-Middle attack occurs

The Man-in-the-Middle [MITM] attack intercepts a communication between two systems. For example, in an http transaction the target is the TCP connection between client and server. Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server, as shown in figure 1. Once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication.





This attack can occur, even when One-Time-Password [OTP] tokens are in use. The MITM system simply takes the password as it is issued and uses it to gain access to the online system.

How Digi-Access™ protects against the Man-in-the-Middle attack

Using Digi-Access™ the Man-in-the-Middle attack is not possible because it uses completely different 'key-pair' technology. The server must receive the public key from the Digi-Access™ certificate and the MITM server cannot have the correct configuration to request this (because it is not part of the 'trust-link' that is an integral part of the Digi-Access™ 'key-pair' technology). Therefore the MITM attack will fail to work when the user has a Digi-Access™ certificate.

Concerns about the MS CryptoAPI

Some systems Administrators will refer to the security bug within Microsoft© CryptoAPI [10]. This security bug means that for users that have Internet Explorer© browsers, it is possible for hackers to break into the Microsoft© Certificate store and misappropriate the Digi-Access™ certificate (this does not apply to Mozilla browser users).

However, this security concern is irrelevant if the user has a properly configured PC with regular Microsoft© updates enabled. As most responsible users do have Microsoft© updates enabled (and you can provide help pages to highlight the issue), then this is as much a risk to end users as protecting their computers from viruses.

  • IIS Implementation Guide

Source URL: http://www2.digi-sign.com/digi-access/approach

Links:
[1] http://www2.digi-sign.com/demos/instructions/online+banking
[2] http://www2.digi-sign.com/cell-otp
[3] http://www2.digi-sign.com/support/digi-access/user/mitm
[4] http://www2.digi-sign.com/digi-access/distribute
[5] http://www2.digi-sign.com/digi-access/website
[6] http://www2.digi-sign.com/support/digi-access/user/mitm#cryptoapi
[7] http://www2.digi-sign.com/demos/digi-access#bank
[8] http://www2.digi-sign.com/quote/digi-access
[9] http://www2.digi-sign.com/arp
[10] http://www.microsoft.com/technet/security/bulletin/ms02-050.mspx