[16326] in bugtraq

home help back first fref pref prev next nref lref last post

Re: swc / ActivCard

daemon@ATHENA.MIT.EDU (John Fulmer)
Mon Aug 21 16:24:04 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <39A1588B.77EF04C5@level3.com>
Date:         Mon, 21 Aug 2000 10:27:55 -0600
Reply-To: John.Fulmer@LEVEL3.COM
From: John Fulmer <John.Fulmer@LEVEL3.COM>
X-To:         aland@STRIKER.OTTAWA.ON.CA
To: BUGTRAQ@SECURITYFOCUS.COM

Alan DeKok wrote:

>
>   The ActivCard product uses the industry standard X9.9
> challenge-response algorithm.[1]

Some ActivCard tokens implement a standard X9.9 mode, but most ActivCard
tokens use a proprietary, time and event based modification to the X9.9
algorithm to generate their one time passwords in a synchronous mode.

An overview of what ActivCard does may be found in a white paper at
http://www.activcard.com/activ/services/library/synchronous_authentication.pdf

The time element may be what is introducing the perceived 'limited
randomness' of the token.


>   So far as I recall, X9.9 does NOT define a method for calculating a
> series of one-time passwords.  It assumes that the challenge is
> a random number.  (i.e. generated via a cryptographically strong
> method.)

No, but it is fairly common to do an event synchronous mode with an
'X9.9' token. Heck, Cryptocard does that.

jf

home help back first fref pref prev next nref lref last post