Client Attack |
Password |
Guessing, exhaustive search |
Large entropy; limited attempts |
Client Attack |
Token |
Exhaustive search |
Same as password; theft of object requires presence |
Client Attack |
Biometric |
False match |
Same as password |
Host Attack |
Password |
Plaintext theft, dictionary/exhaustive search |
Hashing; large entropy; protection of password database |
Host Attack |
Token |
Passcode theft |
Same as password; 1-time passcode |
Host Attack |
Biometric |
Template theft |
Capture device authentication; challenge response |
Eavesdropping, theft, and copying |
Password |
Shoulder surfing |
User diligence to keep secret; administrator diligence to quickly revoke compromised passwords; multifactor authentication |
Eavesdropping, theft, and copying |
Token |
Theft, counterfeiting hardware |
Multifactor authentication; tamper resistant/evident token |
Eavesdropping, theft, and copying |
Biometric |
Copying biometric |
Copy detection at capture device and capture device authentication |
Replay |
Password |
Replay stolen password response |
Challenge-response protocol |
Replay |
Token |
Replay stolen passcode response |
Challenge-response protocol; 1-time passcode |
Replay |
Biometric |
Replay stolen biometric template response |
Copy detection at capture device and capture device authentication via chanllenge-response protocol |
Torjan horse |
Password, token, biometric |
Installation of rogue client or capture device |
Authentication of clinet or capture device within trusted security perimeter |
Denial of service |
Password, token, biometric |
Lockout by multiple failed authentications |
Multifactor with token |