2018 IEEE 31st Computer Security Foundations Symposium (CSF) 2018
DOI: 10.1109/csf.2018.00008
|View full text |Cite
|
Sign up to set email alerts
|

An Extensive Formal Analysis of Multi-factor Authentication Protocols

Abstract: Passwords are still the most widespread means for authenticating users, even though they have been shown to create huge security problems. This motivated the use of additional authentication mechanisms used in so-called multifactor authentication protocols. In this paper we define a detailed threat model for this kind of protocols: while in classical protocol analysis attackers control the communication network, we take into account that many communications are performed over TLS channels, that computers may b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…Multi-factor authentication is a method that uses a combination of two or more authentications [7][8][9]. The conventional single authentication method involves security threats through the simple leakage of personal information or malicious hacking [10,11].…”
Section: Background and Related Work 21 Backgroundmentioning
confidence: 99%
“…Multi-factor authentication is a method that uses a combination of two or more authentications [7][8][9]. The conventional single authentication method involves security threats through the simple leakage of personal information or malicious hacking [10,11].…”
Section: Background and Related Work 21 Backgroundmentioning
confidence: 99%
“…In recent years, formal analysis has been widely applied to different types of protocol security analyses [1,2], including 5G authentication and key agreement (AKA) protocol [3,4], transport-layer security (TLS) version 1.3 [5,6], Signal Messaging Protocol [7], Secure Forwarding Protocols [8], and Multifactor Authentication Protocols [9]. eoretical research on the formal analysis is under way, and great progress has been made in observation equivalencies [10] and equality theory [11].…”
Section: Introductionmentioning
confidence: 99%
“…All of the mentioned techniques belong to distinct authentication factors. An authentication factor is a piece of information that can be used to verify the identity of a user [9]. There are three main groups or factors of authentication techniques [10,11]: (i) knowledge-based, that is, based on something that the user knows, such as text passwords; (ii) possession-based, that is, based on something that the user possesses, such as smart cards; and (iii) inherence-based, that is, something that the user is, such as biometrics.…”
Section: Introductionmentioning
confidence: 99%