• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Security Tokens: Counterfeiting and Manipulation

By Abhishek Ghosh April 11, 2024 5:34 pm Updated on April 11, 2024

Security Tokens: Counterfeiting and Manipulation

Advertisement

In our previous articles, we have explained security tokens such as YubiKey. A security token is a piece of hardware used to identify and authenticate users. Occasionally, it is also used to refer to software tokens. They are usually part of a system of access control with two-factor authentication. Other security features must be used for authentication against misuse with this piece of hardware.

 

Authentication Process of Security Tokens

 

  1. The user initiates the data exchange between the token and the verification system, e.g. by holding the token in front of a reader.
  2. The reader identifies the token by its unique identification number(s), such as its type number, a media serial number, a carrier registration number, and/or a user class number.
  3. The data set read by the token is compared by the verification system with corresponding local reference data according to a well-defined verification procedure: The authentication of the token is carried out by means of challenge-response authentication, possibly further check data as additional security features, such as a PIN, are requested from the carrier of the token.
  4. To be on the safe side, the local reference data is compared with other reference data from a database from a remote server (e.g. via a leased line or a protected dial-up line).
  5. In the event of an invalid token or invalid further reference data, the verification system rejects further access.
  6. To trace authentication, event data from the check process is transmitted back to the server.
  7. The verification system approves the permissible use for the bearer of the token, such as functions and/or data.
Security Tokens Counterfeiting and Manipulation

 

Security, Counterfeiting and Manipulation

 

For security-critical applications, a security token must be a unique item that is specially secured against manipulation and duplication or counterfeiting.

The security token must generate session keys to be used once from a fixed secret stored in the token, the so-called primary key. For this purpose, a cryptoprocessor is used, which are specially equipped microcontrollers that are equipped with additional security functions. These safety functions primarily protect against unwanted readouts and reverse engineering, for example by completely missing conventional development interfaces such as JTAG from the circuit. Cryptographic methods are used for this purpose. The cryptographic operations then take place within the chip.

Advertisement

---

Methods that only allow identification but not authentication are also used in practice for authentication. A code of such tokens is not forgery-proof, as the identification feature can be freely read and reproduced. These processes include solutions with passive RFID chips, which have a unique serial number and have been developed according to various ISO standards for use in electronic labels (tags).

Insecure in the sense of copyable are pure storage solutions with chip cards, magnetic stripe cards, barcodes, key files on data carriers such as USB sticks and the classic key. An attack can also be made on the communication between an (otherwise secure) token and the reader, in the simplest case via a replay attack. Freely accessible (USB) connection cables make it easy to connect data loggers. In particular, if there is no mechanical and/or visual control of the token by the reader or operating personnel, devices that do not need to resemble the original token in type and size can also be used to overcome the system. Radio transmissions can often be recorded at great distances and thus offer a large attack surface for manipulation.

There will never be an absolutely secure solution with a single authentication factor, every security procedure can be overcome. The design of the token and the type of (mechanical, electrical, magnetic, optical, …) Data transmission has a major impact on protection against manipulation. For example, a smart card can be completely retracted and shielded by a reader. Likewise, the design of a reader or customer terminal as a compact unit that is protected against theft, replacement and other manipulation contributes significantly to security.

 

Discussion of Solutions

 

The differentiation of the use cases is a prerequisite for a meaningful assessment of security, for example:

  1. Access control from public spaces
  2. Access control in public spaces
  3. Access control in a well-secured room
  4. Access control with good separation from the environment

All applications in public spaces are inevitably endangered by unauthorized third parties. Claims to the contrary rely on restrictions that are usually not explicitly mentioned, such as the maximum usable reading distance. The ease of use always goes hand in hand with hazards. Generalizations are not helpful.

Tagged With oppositegfo
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Security Tokens: Counterfeiting and Manipulation

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

  • What Are Software Tokens?

    Software tokens (also known as soft tokens) are stored on an electronic device, such as a desktop computer, laptop, PDA, or mobile phone, and can be duplicated (unlike hardware tokens, where credentials cannot be duplicated unless one physically enters the device). The counterpart of software tokens is hardware security tokens. Because software tokens are something […]

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy