Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

RSA says hack won't allow "direct attack" on SecureID tokens

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » General Discussion Donate to DU
 
LiberalArkie Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-19-11 09:17 AM
Original message
RSA says hack won't allow "direct attack" on SecureID tokens
Security firm RSA has been the victim of an "extremely sophisticated" attack that has resulted in exfiltration of certain private information, announced Executive Chairman Art Coviello in an open letter published yesterday. The company also filed a note with the SEC, warning of possible risks due to the attack. Since 2006, RSA has been part of EMC.

Some of the information taken relates to the company's SecurID security token hardware and its smartphone-based software equivalent. SecurID tokens are used in two-factor authentication systems; to authenticate, users use both a password and a number generated by the SecurID token. Each token generates a sequence of six-digit pseudo-random numbers, with a new number generated every 60 seconds. The number entered by the user must match the number that the authentication server expects the token to generate, and so allows the server to prove that the user not only knows the password, but also is in possession of the token. Each token has a unique 128-bit seed value to initialize its sequence of numbers. Every user account in the authentication server is associated with the seed of their respective token; this allows the server to know what random numbers to expect.



http://arstechnica.com/security/news/2011/03/rsa-says-hack-wont-allow-direct-attack-on-secureid-tokens.ars


Note: This is a big deal. RSA was on conference calls Thursday with customers.
Printer Friendly | Permalink |  | Top
bluecoat_fan Donating Member (118 posts) Send PM | Profile | Ignore Sat Mar-19-11 10:37 AM
Response to Original message
1. "reduce the effectiveness" means strong passwords a MUST
But no one does, so this is really bad!
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 30th 2024, 03:11 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » General Discussion Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC