On 07.05.14 22:19, Brent Wallis wrote:
> On Wed, May 7, 2014 at 9:54 PM, Erik Christiansen
> > Such dongles merely generate one-time passwords, changing every few
> > seconds. They are driven by a pseudo-random sequence generator, I figure.
> > It is trivial to build one into a CMOS chip which runs for years on the
> > tiny sealed-in battery, yet does not repeat in 100 human lifetimes.
> >
> > The one weakness, in the event of the account ID and password both being
> > acquired, is that a lucky crim might randomly guess the token value for
> > that instant, since that's only 1 in a million.
> >
> > I agree in part... but remember... 1 in a million is a a simple and
> solvable challenge for a smart person with an x86 CPU... :-)

Please re-read. If the PRSG "does not repeat in 100 human lifetimes",
then that the output token is only 6 digit does not help with sequence
length, polynomial, or current position computability, even where it
just comes from 20 bits of the much longer internal current value.
Furthermore, nothing useful can be computed even if the attacker had the
account ID, password, _and_ one 20 bit value from even a 64 bit current
sequence value. It's rather hard to decode from a single point. ;-)

Erik

-- 
We cannot do everything at once, but we can do something at once.
                                                   - Calvin Coolidge

_______________________________________________
luv-main mailing list
[email protected]
http://lists.luv.asn.au/listinfo/luv-main

Reply via email to