Share to: share facebook share twitter share wa share telegram print page

S/KEY

S/KEY is a one-time password system developed for authentication to Unix-like operating systems, especially from dumb terminals or untrusted public computers on which one does not want to type a long-term password. A user's real password is combined in an offline device with a short set of characters and a decrementing counter to form a single-use password. Because each password is only used once, they are useless to password sniffers.

Because the short set of characters does not change until the counter reaches zero, it is possible to prepare a list of single-use passwords, in order, that can be carried by the user. Alternatively, the user can present the password, characters, and desired counter value to a local calculator to generate the appropriate one-time password that can then be transmitted over the network in the clear. The latter form is more common and practically amounts to challenge–response authentication.

S/KEY is supported in Linux (via pluggable authentication modules), OpenBSD, NetBSD, and FreeBSD, and a generic open-source implementation can be used to enable its use on other systems. OpenSSH also implements S/KEY since version OpenSSH 1.2.2 was released on December 1, 1999.[1] One common implementation is called OPIE. S/KEY is a trademark of Telcordia Technologies, formerly known as Bell Communications Research (Bellcore).

S/KEY is also sometimes referred to as Lamport's scheme, after its author, Leslie Lamport. It was developed by Neil Haller, Phil Karn and John Walden at Bellcore in the late 1980s. With the expiration of the basic patents on public-key cryptography and the widespread use of laptop computers running SSH and other cryptographic protocols that can secure an entire session, not just the password, S/KEY is falling into disuse.[citation needed] Schemes that implement two-factor authentication, by comparison, are growing in use.[2]

Password generation

The server is the computer that will perform the authentication.

S/KEY password generation
  1. This step begins with a secret key W. This secret can either be provided by the user, or can be generated by a computer. Either way, if this secret is disclosed, then the security of S/KEY is compromised.
  2. A cryptographic hash function H is applied n times to W, thereby producing a hash chain of n one-time passwords. The passwords are the results of the application of the cryptographic hash function:
    H(W), H(H(W)), ..., Hn(W).
  3. The initial secret W is discarded.
  4. The user is provided with the n passwords, printed out in reverse order:
    Hn(W), Hn−1(W), ..., H(H(W)), H(W).
  5. The passwords H(W), H(H(W)), ..., Hn−1(W) are discarded from the server. Only the password Hn(W), the one at the top of the user's list, is stored on the server.

Authentication

S/KEY authentication

After password generation, the user has a sheet of paper with n passwords on it. If n is very large, either storing all n passwords or calculate the given password from H(W) become inefficient. There are methods to efficiently calculate the passwords in the required order, using only hash calculations per step and storing passwords.[3]

More ideally, though perhaps less commonly in practice, the user may carry a small, portable, secure, non-networked computing device capable of regenerating any needed password given the secret passphrase, the salt, and the number of iterations of the hash required, the latter two of which are conveniently provided by the server requesting authentication for login.

In any case, the first password will be the same password that the server has stored. This first password will not be used for authentication (the user should scratch this password on the sheet of paper), the second one will be used instead:

  • The user provides the server with the second password pwd on the list and scratches that password.
  • The server attempts to compute H(pwd), where pwd is the password supplied. If H(pwd) produces the first password (the one the server has stored), then the authentication is successful. The server will then store pwd as the current reference.

For subsequent authentications, the user will provide passwordi. (The last password on the printed list, passwordn, is the first password generated by the server, H(W), where W is the initial secret). The server will compute H(passwordi) and will compare the result to passwordi−1, which is stored as reference on the server.

Security

The security of S/KEY relies on the difficulty of reversing cryptographic hash functions. Assume an attacker manages to get hold of a password that was used for a successful authentication. Supposing this is passwordi, this password is already useless for subsequent authentications, because each password can only be used once. It would be interesting for the attacker to find out passwordi−1, because this password is the one that will be used for the next authentication.

However, this would require inverting the hash function that produced passwordi−1 using passwordi (H(passwordi−1) = passwordi), which is extremely difficult to do with current cryptographic hash functions.

Nevertheless, S/KEY is vulnerable to a man in the middle attack if used by itself. It is also vulnerable to certain race conditions, such as where an attacker's software sniffs the network to learn the first N − 1 characters in the password (where N equals the password length), establishes its own TCP session to the server, and in rapid succession tries all valid characters in the N-th position until one succeeds. These types of vulnerabilities can be avoided by using ssh, SSL, SPKM, or other encrypted transport layer.

Since each iteration of S/KEY doesn't include the salt or count, it is feasible to find collisions directly without breaking the initial password. This has a complexity of 264, which can be pre-calculated with the same amount of space. The space complexity can be optimized by storing chains of values, although collisions might reduce the coverage of this method, especially for long chains.[4]

Someone with access to an S/KEY database can break all of them in parallel with a complexity of 264. While they wouldn't get the original password, they would be able to find valid credentials for each user. In this regard, it is similar to storing unsalted 64-bit hashes of strong, unique passwords.

The S/KEY protocol can loop. If such a loop were created in the S/KEY chain, an attacker could use user's key without finding the original value, and possibly without tipping off the valid user. The pathological case of this would be an OTP that hashes to itself.

Usability

Internally, S/KEY uses 64-bit numbers. For human usability purposes, each number is mapped to six short words, of one to four characters each, from a publicly accessible 2048-word dictionary. For example, one 64-bit number maps to "ROY HURT SKI FAIL GRIM KNEE".[5]

See also

References

  1. ^ "OpenSSH Project History". OpenSSH. Retrieved 2019-12-05.
  2. ^ "Global Multi-factor Authentication Market 2017-2021". TechNavio. August 2017. Retrieved 2019-12-05.
  3. ^ D. Yum, J. Seo, S. Eom, and P. Lee, “Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity,” Topics in Cryptology–CT-RSA 2009, pp. 325–339, 2009. [1]
  4. ^ Samuel, Michael (2011-07-01). "S/Key Dungeon Attack". Retrieved 2019-12-05.
  5. ^ Haller, Neil; Metz, Craig; Nesser II, Philip J.; Straw, Mike (1998). "Appendix D: Dictionary for Converting Between 6-Word and Binary Formats". A One-Time Password System. IETF. doi:10.17487/RFC2289.

Read other articles:

78th Infantry Division78th Infantry Division shoulder sleeve insigniaActive1917 – 19191921 – 19461946 – presentCountry United StatesBranch United States ArmyTypeInfantrySizeDivisionNickname(s)Lightning (special designation)[1]Motto(s)Audaciter (Boldly)EngagementsWorld War I St. Mihiel Meuse-Argonne World War II Rhineland Ardennes-Alsace Central Europe CommandersCurrentcommanderBrigadier General Christopher W. CookNotablecommandersHugh L. Scott Norman Schwarzkopf Sr. Edwin…

Becoming WitchPoster promosiHangul마녀는 살아있 Alih Aksara yang DisempurnakanManyeoneun SaraitdaArtiThe Witch Is Alive GenreKomedi hitamMisteri[1]PengembangTV Chosun (Jeong Hwi-seok production plan)[2][3]Ditulis olehPark Pa-ran[3]SutradaraKim Yun-cheol[3]PemeranLee Yu-riLee Min-youngYoon So-yiNegara asalKorea SelatanBahasa asliKoreaProduksiProduser eksekutifJeong Hyeong-seo (TV Chosun)[3]ProduserKim Seong-min[3]Lee Chang-ho[3]…

Kenny di tahun 2008 San Diego Comic-Con Tom Kenny telah tampil dalam berbagai film, acara televisi, dan video game. Dia terkenal karena menyuarakan karakter judul di SpongeBob SquarePants waralaba. Selain itu, Kenny telah menyuarakan banyak karakter lain dalam serial ini termasuk Gary si Siput, Narator Prancis, dan penggambaran aksi langsungnya sebagai Patchy the Pirate. Peran lainnya termasuk Heffer Wolfe dalam Rocko's Modern Life; Raja Es dalam Waktu Petualangan; Narator dan Wali kota di The P…

King of Anuradhapura Khallata NagaKing of AnuradhapuraReign109 BC – 103 BCPredecessorLanja TissaSuccessorValagambaDied103 BCSpouseQueen Consort AnuladeviIssueMahakuli MahatissaHouseHouse of VijayaFatherSaddha TissaReligionTheravāda Buddhism Khallata Naga, also known as Kalunna, was an early monarch of Sri Lanka of the Anuradhapura Kingdom from 109 BC to 103 BC.[1] Reign Khallata Naga was the third son of Saddha Tissa, and younger brother of Thulatthana and Lanja Tissa. In the period o…

Raden Setijo Nugroho Hasto Putro Kasubdit Fasharkan Ditpolair Korpolairud Baharkam Polri Informasi pribadiLahir23 Agustus 1970 (umur 53)Bandung, Jawa BaratAlma materAkademi Kepolisian (1994)Karier militerPihak IndonesiaDinas/cabang Kepolisian Negara Republik IndonesiaMasa dinas1994—sekarangPangkat Komisaris Besar PolisiSatuanPolairudSunting kotak info • L • B Kombes. Pol. Raden Setijo Nugroho Hasto Harjo Putro, S.I.K. (lahir 23 Agustus 1970) adalah seorang perwira …

Part of a series onBritish law Acts of Parliament of the United Kingdom Year      1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879…

دوري الدرجة الأولى الروماني 1969–70 تفاصيل الموسم دوري الدرجة الأولى الروماني  النسخة 52  البلد رومانيا  التاريخ بداية:16 أغسطس 1969  نهاية:22 يوليو 1970  المنظم اتحاد رومانيا لكرة القدم  البطل يو تي أي أراد  الهابطون بيهور أوراديا  مباريات ملعوبة 240   عدد المشار…

This article may rely excessively on sources too closely associated with the subject, potentially preventing the article from being verifiable and neutral. Please help improve it by replacing them with more appropriate citations to reliable, independent, third-party sources. (May 2022) (Learn how and when to remove this template message) Bureau of Indian Affairs PoliceBIA Police patchSeal of the BIABIA Police badgeFlag of the BIACommon nameBIA PoliceAbbreviationBIAPJurisdictional structureO…

追晉陸軍二級上將趙家驤將軍个人资料出生1910年 大清河南省衛輝府汲縣逝世1958年8月23日(1958歲—08—23)(47—48歲) † 中華民國福建省金門縣国籍 中華民國政党 中國國民黨获奖 青天白日勳章(追贈)军事背景效忠 中華民國服役 國民革命軍 中華民國陸軍服役时间1924年-1958年军衔 二級上將 (追晉)部队四十七師指挥東北剿匪總司令部參謀長陸軍總…

EU relationships For relationships between the European Union and candidate or official potential candidate countries, see Future enlargement of the European Union. For third-country relationships with the European Union in general, see Foreign relations of the European Union. The European Union has a number of relationships with foreign states. According to the European Union's official site, and a statement by Commissioner Günter Verheugen, the aim is to have a ring of countries, sharing EU's…

Bruneian bureaucrat (born 1955) In this Malay name, there is no surname or family name. The name Othman is a patronymic, and the person should be referred to by their given name, Adina. The word bin or binti/binte means 'son of' or 'daughter of', respectively. Datin PadukaAdina binti OthmanDPMBادينا بنت عثمانDatin Adina (seated left) in Tokyo, 20163rd Deputy Minister of Culture, Youth and SportsIn office29 May 2010 (2010-05-29) – 22 October 2015&#…

artikel ini perlu dirapikan agar memenuhi standar Wikipedia. Tidak ada alasan yang diberikan. Silakan kembangkan artikel ini semampu Anda. Merapikan artikel dapat dilakukan dengan wikifikasi atau membagi artikel ke paragraf-paragraf. Jika sudah dirapikan, silakan hapus templat ini. (Pelajari cara dan kapan saatnya untuk menghapus pesan templat ini) Untuk turnamen wanita, lihat Piala Negara-Negara Afrika Wanita 2024. Artikel ini mendokumentasikan sebuah Africa Cup of Nations yang sedang berlangsu…

この記事は検証可能な参考文献や出典が全く示されていないか、不十分です。出典を追加して記事の信頼性向上にご協力ください。(このテンプレートの使い方)出典検索?: コルク – ニュース · 書籍 · スカラー · CiNii · J-STAGE · NDL · dlib.jp · ジャパンサーチ · TWL(2017年4月) コルクを打ち抜いて作った瓶の栓 コルク(木栓、蘭&…

صورة تبين إختلاف نسبة المدن الإيطالية التي تحتوي مواقع التراث العالمي في إيطاليا. مواقع التراث العالمي التابعة لمنظمة الأمم المتحدة للتربية والعلم والثقافة (اليونسكو) هي أماكن ذات أهمية عالية بالنسبة للتراث الثقافي أو الطبيعي على النحو المبين في اتفاقية اليونسكو للتراث ال…

Unità astronomicaLa linea grigia indica la distanza Terra-Sole, che in media è circa 1 unità astronomicaInformazioni generaliSistemaSA Grandezzalunghezza Simboloau, AU, UA, A Conversioni 1 au in... ...equivale a... Unità SI1,495978707×1011 m Unità CGS1,495978707×1013 cm Unità US/Imp9,2956×107 mi Unità di Planck≈9,35×1045 lP Unità atomiche≈2,827×1021 a0 Unità SA4,8481×10−6 pc1,5813×10−5 al Modifica dati su Wikidata · Manuale L'unità astronom…

Земская почтаУезды Алатырский Александрийский Ананьевский Ардатовский Арзамасский Аткарский Ахтырский Балашовский Бахмутский Бежецкий Белебеевский Белозерский Бердянский Бобровский Богородский Богучарский Борисоглебский Боровичский Бронницкий Бугульминский Бугу…

Bangladeshi politician Shamsul Hoque Tukuশামসুল হক টুকুTuku in 201213th Deputy Speaker of the Jatiya SangsadIncumbentAssumed office 28 August 2022SpeakerShirin Sharmin ChaudhuryPreceded byFazle Rabbi MiahMember of ParliamentIncumbentAssumed office 6 January 2009Preceded byMatiur Rahman NizamiConstituencyPabna-1Minister of State for Home AffairsIn officeJuly 2009 – 12 January 2014Prime MinisterSheikh HasinaMinisterSahara KhatunMuhiuddin Khan AlamgirSheik…

Political party in Colombia This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Colombian Social Democratic Party – news · newspapers · books · scholar · JSTOR (December 2009) (Learn how and when to remove this message) This article is part of a series on thePolitics ofColombia Government Constitution of Colombia Law Taxation Policy…

Cet article est une ébauche concernant une chronologie ou une date et le Maroc. Vous pouvez partager vos connaissances en l’améliorant (comment ?) selon les recommandations des projets correspondants. Chronologies Données clés 1998 1999 2000  2001  2002 2003 2004Décennies :1970 1980 1990  2000  2010 2020 2030Siècles :XIXe XXe  XXIe  XXIIe XXIIIeMillénaires :Ier IIe  IIIe  Chronologies géographiques Afrique Afrique du Sud, Alg…

Australian rules footballer Australian rules footballer Bert Gook Personal informationFull name Albert Henry GookDate of birth c. 1914Date of death 15 December 1964 (aged 50)Place of death Dianella, Western AustraliaOriginal team(s) South PerthHeight 178 cm (5 ft 10 in)Weight 70 kg (154 lb)[1]Position(s) Centre, full-forwardPlaying career1Years Club Games (Goals)1933–1940 Perth 148 (512)Representative team honoursYears Team Games (Goals)1934–1938 Western…

Kembali kehalaman sebelumnya