Page 136 - CISSO_Prep_ Guide
P. 136

Ownership

            The use of smartcards, tokens, RFID (radio frequency identifier)
            badges or other items represents the principle of authentication
            by ownership. Tokens are usually used to generate one time or
            dynamic passwords - a password that is only used once and then
            discarded so that it cannot be used in a replay attack even if an
            attacker learns the password. Ownership based systems may be
            very simple such as a scratch card or very expensive systems
            with card readers installed at each workstation. Tokens and
            smartcards are usually either synchronous or asynchronous
            working on either an event or time based or challenge-response
            scheme.



            Synchronous Tokens
            Synchronous tokens use a token that is in sync with the
            authentication server (AS). The AS knows the value on the
            token and will permit access to the user if the user provides the
            correct value. In many cases, the user must enter a PIN number
            (sometimes using the employee ID number) to activate the
            device. Synchronous tokens are usually either event-based or
            time-based.



            Event-based Synchronous Tokens

            Event-based tokens generate a new random value each time the
            user presses a button or requests a new value. When a user
            attempts to log in, the system will challenge the user for the next
            value generated by their token. The user will request that value
            from the token and supply it back to the authentication server. If
            the value is correct, access will be granted.
   131   132   133   134   135   136   137   138   139   140   141