Authentication - Verifier Impersonation Resistance, v1.0

Authentication with verifier impersonation resistance requires strong cryptographic binding of the authenticated channel with the authenticator output.

Assessment Steps (3)

1
In-Channel Strong Crypto Binding (In-ChannelStrongCryptoBinding)
Is the authentication protocol impersonation resistant? Typically this requires client certificate authentication or an equivalent mechanism that happens over an existing TLS bound channel.
Artifact
A1
Provide evidence (e.g. policies, operational details, processes) that the authentication protocol is impersonation resistant.
2
Approved Crypto (ApprovedCrypto)
Is approved crypto used for establishing the impersonation resistance?
Artifact
A1
Provide evidence (e.g. policies, operational details, processes) that the crypto used is approved and sufficiently strong.
3
Manual Entry Disallowed (ManualEntryDisallowed)
Does the impersonation resistance not use an out of band authenticator that requires typed input? This does not bind the session strongly enough.

Conformance Criteria (3)

C1
A verifier impersonation-resistant authentication protocol SHALL establish an authenticated protected channel with the verifier. It SHALL then strongly and irreversibly bind a channel identifier that was negotiated in establishing the authenticated protected channel to the authenticator output (e.g., by signing the two values together using a private key controlled by the claimant for which the public key is known to the verifier). The verifier SHALL validate the signature or other information used to prove verifier impersonation resistance. This prevents an impostor verifier, even one that has obtained a certificate representing the actual verifier, from replaying that authentication on a different authenticated protected channel.
Citation
NIST SP 800-63B
Section 5.2.5, Paragraph 2
C2
Approved cryptographic algorithms SHALL be used to establish verifier impersonation resistance where it is required. Keys used for this purpose SHALL provide at least the minimum security strength specified in the latest revision of SP 800-131A (112 bits as of the date of this publication).
Citation
NIST SP 800-63B
Section 5.2.5, Paragraph 3
C3
Authenticators that involve the manual entry of an authenticator output, such as out-of-band and OTP authenticators, SHALL NOT be considered verifier impersonation-resistant because the manual entry does not bind the authenticator output to the specific session being authenticated.
Citation
NIST SP 800-63B
Section 5.2.5, Paragraph 5