Tokens, also known as smart tokens, are password-generating devices that subjects must carry with them as a type of two-factor authentication. There are four main types of tokens: static tokens, synchronous dynamic password tokens, asynchronous dynamic password tokens, and challenge-response tokens. Static tokens offer physical identity verification but require an additional factor for authentication, while the other token types generate passwords at fixed time intervals, based on events, or in response to instructions from the authentication system. Tokens provide stronger authentication than passwords alone but can prevent access if lost, stolen, or broken.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
66 views12 pages
3 - Tokens
Tokens, also known as smart tokens, are password-generating devices that subjects must carry with them as a type of two-factor authentication. There are four main types of tokens: static tokens, synchronous dynamic password tokens, asynchronous dynamic password tokens, and challenge-response tokens. Static tokens offer physical identity verification but require an additional factor for authentication, while the other token types generate passwords at fixed time intervals, based on events, or in response to instructions from the authentication system. Tokens provide stronger authentication than passwords alone but can prevent access if lost, stolen, or broken.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12
Tokens
Tokens • Also known as smart tokens. Are password- generating devices that subjects must carry with them. It is an example of Type 2 factor, or “something you have”
• It can be a static password device, such as an
ATM card or other memory card. Four types of token devices: • Static tokens • Synchronous dynamic password tokens • Asynchronous dynamic password tokens • Challenge-response tokens Static token • Offer a physical means to provide identity. • Require an additional factor to provide authentication • Most device static tokens host a cryptographic key, such as a private key, digital signature, or encrypted logon credentials • Cryptographic key can be used as an identifier or as an authentication mechanism • The cryptographic key is much stronger than a password because it is pre-encrypted using a strong encryption, it is significantly longer, and it resides only in the token. • Mostly used as identification rather than authentication factors. Examples of Static token: • Swipe card • Smart card • Floppy disk Synchronous dynamic password token • Generates passwords at fixed time intervals • Time interval tokens require that the clock on the authentication server and the clock on the token device be synchronized. • The generated password is entered into the system by the subject along with a PIN, pass phrase, or password. • The generated password provides the identification, and the PIN/pass Asynchronous dynamic password token • Generates passwords based on the occurrence of an event. • An event token requires that the subject press a key on the token and on the authentication server. This action advances to the next password value. • The generated password and the subject’s PIN, pass phrase, or password are entered into the system for authentication. One-Time Password Generators • Create the passwords for your users and make one-time passwords reasonable to deploy. • Users only need to possess the token device, have knowledge of the logon procedure , and possibly have memorized a short PIN. Challenge-response Tokens • Generate passwords or responses based on instructions from the authentication system. Advantage • Uses two or more factors to establish identity and provide authentication • The subject must be in physical possession of the token device Disadvantage • If the battery dies or device is broken, the subject is unable to gain access • Can be lost or stolen