A Replay Attack Resilient System for PKI Based Authentication in Challenge-Response Mode for Online Application

Passwords had been the common mechanism for authentication in the earlier day's client-server based systems as well as in the modern day online applications. However, it is the weakest form of authentication. In today's digital world, attacker easily bypasses this form of security. The efforts of strengthening passwords are rendered meaningless by the tools that attackers use. In order to design and codify a secure authentication mechanism, this paper presents an authentication mechanism integrated with Cryptographic USB token. Public Key Infrastructure (PKI) works on key pair and Digital Certificate for identifying the user identify. The Cryptographic USB token based on PKI enforces security of the authentication process by means of private key in the token. The authentication mechanism presented in the paper provides multi-layer security. The authentication Mechanism is based on a trusted user session. Unique Session Identifiers are created as well as deactivated automatically at run time in case there is no data transfer in the channel for a predefined time. Once a session has been created the user is authenticated and logged in to the session. Thereafter the session identifier is checked at the server to prevent session replay attack. Another significant level of security is added by secure handshaking between server and client so that authentication mechanism could work in challenge response mode. The software system presented in the paper has been exposed to vulnerability assessment with a special emphasis on penetration tests, session replay attacks, and use of revoked keys. The vulnerability assessment results indicated the secured framework provided by the developed mechanism.

[1]  Somchart Fugkeaw,et al.  A Robust Single Sign-On Model Based on Multi-Agent System and PKI , 2007, Sixth International Conference on Networking (ICN'07).

[2]  Dae-Hee Seo,et al.  Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification , 2006, ICCSA.

[3]  Gaurav Agarwal,et al.  Password based authentication: Philosophical survey , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[4]  Jia-Lun Tsai,et al.  Novel Anonymous Authentication Scheme Using Smart Cards , 2013, IEEE Transactions on Industrial Informatics.

[5]  Vadim Okun,et al.  Building a Test Suite for Web Application Scanners , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[6]  Sumit Goswami,et al.  Reducing Attack Surface of a Web Application by Open Web Application Security Project Compliance , 2012 .

[7]  H. B. Tang,et al.  A secure biometric-based authentication scheme using smart card , 2013 .

[8]  Nermin Hamza,et al.  A dynamic ID-based authentication scheme with smart token , 2009, 2009 International Conference on Computer Engineering & Systems.