Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10340973 | Computers & Security | 2005 | 7 Pages |
Abstract
SecurID tokens are developed by SDTI/RSA Security to authenticate users to a corporate computer infrastructure. In this paper we show the results of our analysis of the function contained in these tokens. The block cipher at the heart of the function can be broken in milliseconds. We present two attack scenarios on the full function: if one can observe the output of the device during some time period, one can predict with high probability future output values and one can recover the secret key significantly faster than by exhaustive search.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Alex Biryukov, Joseph Lano, Bart Preneel,