Secured password management

October 2010 Information Security

As the use of Internet services surges, end users are required to have multiple passwords for everything from e-mail services to e-banking applications and corporate accounts. Additionally, they are required to have another set of pass codes for the different devices employed to connect to the Internet.

With the diverse combination of alphanumeric characters utilised to create these passwords aiming to add layers of identity theft protection, it has further rendered the whole process more complex for the user. Thus, there is a pressing need to have a secured application to adeptly manage and store all these passwords against foreign attacks.

In order to address the aforementioned need, researchers from Germany-based Fraunhofer Institute for Secure Information Technology (SIT) have developed an innovative security tool aimed to provide a more robust and secure platform to restore all passwords. The solution, termed MobileSitter, focuses on secure mobile management of authentic passwords and personal identification number (PINs) positioned on mobile phones. In situations, where such a device is stolen, each master password entered by the hacker will trigger the MobileSitter to return random decrypted results correlated with the entered master password.

Rather than indicating that a false entry has been entered, the solution continues to render results. Thus, the hacker will not be able to differentiate and ensure if the returned result is correct. Consequently, the hacker will apply the returned result and will eventually perceive that all the results are totally false. Therefore, the MobileSitter could efficiently avoid hackers from retrieving other stored critical pass codes on the mobile device.

Compared to competing password management solutions, the MobileSitter leverages a dynamic encryption algorithm in which the different passwords are computer generated. Frost & Sullivan believes this equips the MobileSitter to a higher grade of security and renders a different level of complexity for dictionary attacks provisioned to breach and decrypt the protected pass codes. It is commonly known that user-selected pass codes drastically reduce the set of keys utilised and thus expose them fairly easily to foreign dictionary attacks.

The MobileSitter is developed using the Java Platform, Micro Edition (ME), which is widely utilised for applications on mobile devices. Therefore, a key advantage of this solution is that it could be installed on devices that are much less sophisticated and have reduced capacity, for example, old mobile phones. The minimal requirement is that the mobile device can execute Java applications, which require very low processing functionality. Furthermore, the encrypted data could seamlessly interchange with different devices and thus enhance the utility value of this service for the user. With its simplistic characteristic and ease of implementation ability, this could empower the solution to provide a more viable password management platform and reach a large base of users.

Frost & Sullivan expects this technology to provide a new dimension for the mobile security industry that could gain significant acceptance in the next 2-3 years.

For more information contact Frost & Sullivan, +27 (0)18 464 2402, [email protected], www.frost.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
The role of advanced technologies in ransomware recovery
Information Security
As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.

Read more...