Title :
Impersonation attacks on software-only two-factor authentication schemes
Author_Institution :
Dept. of Software Eng., Sejong Univ., Seoul, South Korea
Abstract :
Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This article brings to light such a hidden weak point and suggests a possible solution.
Keywords :
cryptography; message authentication; protocols; telecommunication security; DSA-based scheme; authentication protocol; communications network; cryptographic camouflage; impersonation attacks; interleaved sessions; server; software-only two-factor authentication; Authentication; Communication networks; Cryptographic protocols; Information security; Monitoring; Network servers; Protection; Public key; Public key cryptography; Smart cards;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2002.802034