Jump to content

Draft:X.1280

From Wikipedia, the free encyclopedia
  • Comment: This is an advertisement for a particular product standard, not an encyclopedic article that covers information about the project as covered in reliable, independent sources. Caleb Stanford (talk) 20:02, 10 May 2025 (UTC)

X.1280
Framework for out-of-band server authentication using mobile devices
StatusIn force (Recommendation)
Year started2022
Latest version1.0
March 1, 2024; 14 months ago (2024-03-01)
OrganizationITU-T
CommitteeITU-T Study Group 17
SeriesX
Related standardsX.509, X.1254
DomainCybersecurity,
Identity management,
Authentication,
biometric authentication
Websitehandle.itu.int/11.1002/1000/15661

X.1280 is an International Telecommunication Union(ITU) standard for verifying a service provider before user information.[1]

The title of x.1280 is out-of-band server authentication. This standard contains out-of-band authentication and mutual authentication. The out-of-band authentication makes it difficult for attackers to intercept because the attackers need to hijack two channels at the same time. [2] Mutual authentication can increase the security level compared to one-way authentication. One-way authentication only verifies the user's identity, but mutual authentication verifies the user and the service providers. In this way, mutual authentication can help stop some kinds of attacks.[3]

  • On-path attacks
  • Spoofing and impersonation
  • Credential theft

X.1280 uses an out-of-band mobile authenticator, typically a smartphone, and may incorporate biometric authentication for applying MFA(Multi-factor authentication). However, a key feature is that no additional hardware, such as dedicated security tokens, is required beyond a smartphone. It allows the use of a unified authenticator across various devices. To authenticate via X.1280, prior registration is required. When a service provider supports X.1280-based authentication, the mobile authenticator must first be registered and then used for authentication.

Purpose

[edit]

The X.1280 standard is designed to:

  • Enhance security by enabling mutual authentication between users and service providers, ensuring protection against verifier impersonation.
  • Eliminate device dependency by using an out-of-band mobile authenticator, allowing seamless authentication across multiple devices.

Applications

[edit]

X.1280 enables advanced authentication methods, including:

  • User-centric authentication: Users verify the service provider before providing credentials, simplifying the authentication process and enhancing security.
  • Mutual authentication: Both the user and the service provider verify each other, shifting from one-way to two-way authentication.
  • Unified authentication: A single mobile authenticator supports authentication across diverse devices, such as computers, smartphones, automated teller machines (ATMs), and artificial intelligence (AI) speakers, eliminating the need for device-specific authenticators.[4]

Advantages

[edit]

X.1280 enables out-of-band authentication, a method using a separate communication channel for authentication,[2] requiring only a smartphone.[4] Mutual authentication, where both parties verify each other's identity,[3] helps reduce risks of fake site attacks, as demonstrated by EAP-NOOB [5] and Ejiyeh's UAV D2D protocols.[6] Out-of-band authentication enhances this security by using a separate channel, as seen in similar protocols.[5] IoT security standards increasingly incorporate out-of-band authentication for enhanced security.[7]

Limitations

[edit]

X.1280 requires a smartphone, limiting access for users without one. Companies operating servers must develop a mobile app, increasing implementation costs. Network setup complexity may increase in firewall environments due to required configurations, as seen in out-of-band authentication systems. Two-step login may increase authentication time, potentially causing user inconvenience. Similar complexities are noted in IoT authentication standards.[4]

History

[edit]

Process of Authentication

[edit]

X.1280 authentication involves a two-step process: registering a mobile authenticator and performing mutual authentication between the user and the service provider.

  • Authenticator registration
Diagram illustrating the steps of registering a mobile authenticator for X.1280 authentication
Fig 1. Authenticator registration
  1. A user needs to install a mobile application to communicate with an authentication server.
  2. After that, the user needs to request registration from a client. It can be a PC or something else.
  3. Then, the client sends a registration request to the authentication server.
  4. The authentication server generates secure data. In process 8, when the mobile sends a request, the request must contain the secure data.
  5. The authentication server sends information that contains the secure data for verification.
  6. The client provides registration information to the user by an allowed method, such as Email, SMS, QR code, etc.
  7. The user inputs the data received from the client into the pre-installed mobile application.
  8. The application requests verification from the authentication server.
  9. If the request contains secure data, the authentication server registers mobile application information.
  10. The authentication server sends a verification key to the mobile application. The application stores the key.
  • Authentication process
Process of authentication
Fig 2. Process of authentication
  1. A user who registered an authenticator(out-of-band authenticator) request logs in on a client.
  2. Authentication server receives verification request from the client.
  3. The authentication server generates secure data to verify the authenticator.
  4. The authentication server sends authentication information to the client.
  5. The client shows authentication information by text or sound, depending on the type of the client.
  6. The authentication server sends a dataset to the authenticator to generate authentication information.
  7. The authenticator generates authentication information. If the user attempts to log in on a fake client (e.g., a fraudulent web page), the authentication information displayed will differ from that generated by the out-of-band server authenticator.
  8. The authenticator provides authentication information by text or sound, depending on the setting of the mobile application.
  9. The user can approve or reject on the authenticator. When the user approves, additional Multifactor authentication steps (e.g., Knowledge : PIN, Possession: The mobile, Inherent : biometrics) may be required, depending on the verifier’s or mobile application policy.
  10. The authenticator generates user authentication information to send to the authentication server.
  11. The authenticator sends the user authentication information.
  12. The authentication server authenticates the user if the user's authentication information matches.
  13. The authentication server sends the user authentication result to the client.
  14. The client presents a post-login service if the result is positive.

References

[edit]
  1. ^ "Free access for all to ITU-T standards". MIT Libraries. Retrieved 2025-05-16.
  2. ^ a b "Out-of-Band Authentication". Double Octopus. Retrieved 2025-05-16.
  3. ^ a b "What is mutual authentication?". Cloudflare. Retrieved 2025-05-16.
  4. ^ a b c d "ITU-T X.1280: Framework for out-of-band server authentication using mobile devices". ITU-T Recommendation Database. International Telecommunication Union. Retrieved 2025-05-16.
  5. ^ a b Aura, Tuomas; Sethi, Mohit; Peltonen, Aleksi (2021). "Nimble Out-of-Band Authentication for EAP (EAP-NOOB)". RFC. 9140. Retrieved 2025-05-16.
  6. ^ Ejiyeh, Atefeh Mohseni (2024). "Secure, Robust, and Energy-Efficient Authenticated Data Sharing in UAV-Assisted 6G Networks". arXiv:2402.11382 [cs.CR].
  7. ^ "Mutual authentication technology based on out-of-band(OOB) for IoT devices". Telecommunications Technology Association (TTA). Telecommunications Technology Association. Retrieved 2025-05-16.