Impersonation attacks on software-only two-factor authentication schemes

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This letter brings to light such a hidden weak point and suggests a possible solution.

Original languageEnglish
Pages (from-to)358-360
Number of pages3
JournalIEEE Communications Letters
Volume6
Issue number8
DOIs
Publication statusPublished - 2002 Aug 1

Fingerprint

Camouflage
Single Server
Communication Networks
Authentication
Telecommunication networks
Servers
Attack
Software

All Science Journal Classification (ASJC) codes

  • Modelling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

@article{8a9a530ecee64d6b8e500fc553eb74d6,
title = "Impersonation attacks on software-only two-factor authentication schemes",
abstract = "Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This letter brings to light such a hidden weak point and suggests a possible solution.",
author = "Taekyoung Kwon",
year = "2002",
month = "8",
day = "1",
doi = "10.1109/LCOMM.2002.802034",
language = "English",
volume = "6",
pages = "358--360",
journal = "IEEE Communications Letters",
issn = "1089-7798",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "8",

}

Impersonation attacks on software-only two-factor authentication schemes. / Kwon, Taekyoung.

In: IEEE Communications Letters, Vol. 6, No. 8, 01.08.2002, p. 358-360.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Impersonation attacks on software-only two-factor authentication schemes

AU - Kwon, Taekyoung

PY - 2002/8/1

Y1 - 2002/8/1

N2 - Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This letter brings to light such a hidden weak point and suggests a possible solution.

AB - Two-factor authentication is favorable to securely identifying remote users in a communications network. Lately cryptographic camouflage was applied for the purpose by software-only techniques. However it can be vulnerable to impersonation attacks via interleaved sessions if a single server is compromised. This letter brings to light such a hidden weak point and suggests a possible solution.

UR - http://www.scopus.com/inward/record.url?scp=0036670019&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0036670019&partnerID=8YFLogxK

U2 - 10.1109/LCOMM.2002.802034

DO - 10.1109/LCOMM.2002.802034

M3 - Article

AN - SCOPUS:0036670019

VL - 6

SP - 358

EP - 360

JO - IEEE Communications Letters

JF - IEEE Communications Letters

SN - 1089-7798

IS - 8

ER -