Banks and Web security



George Ou has a good post on Banks cheating their way to meet web security guidelines. Many of the observations that he notes come from the Between the Lines column here and are SPOT ON. The biggest I see is related to “multifactor authentication”….


For instance…

On page 3, the Federal guidelines go so far as to list the three factors of security:

Something the user knows (e.g., password, PIN);

Something the user has (e.g., ATM card, smart card) and ;

Something the user is (e.g., biometric characteristic, such as a fingerprint).

Currently MOST approaches that I’ve seen put into practice have a tendency to ask you for 2 or 3 items of something the user knows. This, of course, can easily be compromised.

I remember when online credit card transactions first started, the card number and expiration were pretty much all that was required to be input (plus the billing address). Then they started requiring the CVV2 numbers. Well – ok – so I should ONLY know that if I have the card, but what if the database is compromised of the company that just asked for my CVV2 number???? Are we going to need a third and fourth and further pins and bits of knowledge to be able to properly authenticate online.

I’ve read of some institutions use of some sort of smart card as an authentication factor and would REALLY like to see banks/card authorizations move towards taking at least that factor into account. George mentions that he’s not particularly fond of the biometric factor being pushed and I can agree on that – who wants to encourage theives to branch out into taking the thumb of a victim. (Or taking the victim hostage)… Biometrics I think could easily qualify as “something the user HAS” rather than something the user IS.

The point he gets at is this….

True strong authentication is a smartcard or some other forms of cryptographic tokens. Just the plain old ATM card or credit card does not qualify as strong authentication.

It makes me think in a way of the historical practice of signing letters with a seal. Wax would be dripped to seal the envelope and then the signet ring would be pressed in to leave a mark and it was a unique mark which, at that time would have given someone relative certainty as to the source. (The signets were supposedly unique to the wearer.) Of course, in the world of today, that could be easily forged (and likely was then).

But….. what IF we could go and get a smartcard that had a randomly generated keycode that was unique to us. Then that, as a third party card, could be used via a handshake of some sort with hardware could generate a key that ONLY that keycode could have made. (Much the way ssh encryption is built) All of it done without divulging the secret keycode…. Then if you have to prove your identity present your codecard (or whatever form this takes.) Of course, our computers would need a common and widely compatible way of using this authentication (which may be the hard part in getting widespread implementation.)

   Send article as PDF   

Similar Posts