dc.contributor.author | Naguleswaran, Sivanja | |
dc.date.accessioned | 2020-06-26T06:28:14Z | |
dc.date.issued | 2020-06-26 | |
dc.date.submitted | 2020-06-25T22:00:24Z | |
dc.identifier.uri | https://hdl.handle.net/1956/23023 | |
dc.description.abstract | Authentication is a vital part of this fast-growing, digitalized world. Fundamentally, today’s society is more reliant on computer technology and digitalization than ever before. Therefore, the use of dynamic one-time passwords plays a significant role within online banking in Norway by strengthening the level of security. This study examines four tokens provided by DNB, Sparebanken Møre, Sparebank 1 and Nordea used in token-based authentication and the one-time passwords they generate. By studying one-time passwords collected at various time intervals, it was able to reconstruct the internal token-algorithm and the verification protocol. This research argues that three out of four tokens indicate weaknesses that can have damaging effects. This is also proven by explaining a basic theoretical attack, which demonstrates that the success probability of an attack is higher than the expected probability of 10^(-6) or 10^(-8). | en_US |
dc.language.iso | eng | |
dc.publisher | The University of Bergen | en_US |
dc.rights | Copyright the Author. All rights reserved | |
dc.subject | Experimental study | |
dc.subject | One-time password | |
dc.subject | Online Banking in Norway | |
dc.title | Experimental Study on One-Time Password used in Authentication within Norwegian Banking | |
dc.type | Master thesis | |
dc.date.updated | 2020-06-25T22:00:24Z | |
dc.rights.holder | Copyright the Author. All rights reserved | en_US |
dc.description.degree | Masteroppgåve i informatikk | en_US |
dc.description.localcode | INF399 | |
dc.description.localcode | MAMN-PROG | |
dc.description.localcode | MAMN-INF | |
dc.subject.nus | 754199 | |
fs.subjectcode | INF399 | |
fs.unitcode | 12-12-0 | |
dc.date.embargoenddate | 2021-06-02 | |