The Game of Phishing
Joseph Kilcullen
Moylurg, Foxford Road, Ballina, Co. Mayo, F26 D9D2, Ireland.
ABSTRACT
The current implementation of TLS involves your browser displaying a padlock, and a green bar, after
successfully verifying the digital signature on the TLS certificate. Proposed is a solution where your
browser's response to successful verification of a TLS certificate is to display a login window. That login
window displays the identity credentials from the TLS certificate, to allow the user to authenticate Bob. It
also displays a 'user-browser' shared secret i.e. a specific picture from your hard disk. This is not SiteKey,
the image is shared between the computer user and their browser. It is never transmitted over the internet.
Since sandboxed websites cannot access your hard disk this image cannot be counterfeited by phishing
websites. Basically if you view the installed software component of your browser as an actor in the
cryptography protocol, then the solution to phishing attacks is classic cryptography, as documented in any
cryptography textbook.
KEYWORDS
Game theory, phishing, authentication, cryptography
Comments
Post a Comment