DocumentCode :
801848
Title :
Impersonation attacks on software-only two-factor authentication schemes
Author :
Kwon, Taekyoung
Author_Institution :
Dept. of Software Eng., Sejong Univ., Seoul, South Korea
Volume :
6
Issue :
8
fYear :
2002
Firstpage :
358
Lastpage :
360
Abstract :
Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This article brings to light such a hidden weak point and suggests a possible solution.
Keywords :
cryptography; message authentication; protocols; telecommunication security; DSA-based scheme; authentication protocol; communications network; cryptographic camouflage; impersonation attacks; interleaved sessions; server; software-only two-factor authentication; Authentication; Communication networks; Cryptographic protocols; Information security; Monitoring; Network servers; Protection; Public key; Public key cryptography; Smart cards;
fLanguage :
English
Journal_Title :
Communications Letters, IEEE
Publisher :
ieee
ISSN :
1089-7798
Type :
jour
DOI :
10.1109/LCOMM.2002.802034
Filename :
1025571
Link To Document :
بازگشت