Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

hPIN/hTAN: A lightweight and low-cost e-banking solution against untrusted computers

: Li, S.; Sadeghi, A.-R.; Heisrath, S.; Schmitz, R.; Ahmad, J.J.


Danezis, G.:
Financial Cryptography and Data Security. 15th International Conference, FC 2011. Revised Selected Papers : Gros Islet, St. Lucia, February 28 - March 4, 2011
Berlin: Springer, 2012 (Lecture Notes in Computer Science 7035)
ISBN: 978-3-642-27576-0
ISBN: 978-3-642-27575-3 (print)
ISBN: 3-642-27575-3
ISSN: 0302-9743
International Conference on Financial Cryptography and Data Security (FC) <15, 2011, Gros Islet/St. Lucia>
Conference Paper
Fraunhofer SIT ()

In this paper, we propose hPIN/hTAN, a low-cost hardware token based PIN/TAN system for protecting e-banking systems against the strong threat model where the adversary has full control over the user's computer. This threat model covers various kinds of attacks related to untrusted terminal computers, such as keyloggers, screen scrapers, session hijackers, Trojan horses and transaction generators. The core of hPIN/hTAN is a secure and easy user-computer-token interface. The security is guaranteed by the user-computer-token interface and two underlying security protocols for user/server/transaction authentication. The hPIN/hTAN system is designed as an open framework so that the underlying authentication protocols can be easily reconfigured. To minimize the costs and maximize usability, we chose two security protocols dependent on simple cryptography (a cryptographic hash function). In contrast to other hardware-based solutions, hPIN/hTAN depends on neither a second trus ted channel nor a secure keypad nor external trusted center. Our prototype implementation does not involve cryptography beyond a cryptographic hash function. The minimalistic design can also help increase security because more complicated systems tend to have more security holes. As an important feature, hPIN/hTAN exploits human users' active involvement in the whole process to compensate security weaknesses caused by careless human behavior.