Back to Search
Start Over
Mitigating Vulnerabilities in 3-Factor based Authentication
- Source :
- International Journal of Computer Applications. 76:19-23
- Publication Year :
- 2013
- Publisher :
- Foundation of Computer Science, 2013.
-
Abstract
- Remote user authentication schemes are use to identify a user in the distributed environment. There are three different factors commonly use for authentication purpose named as password, smart card and biometric. It is been observed that authentication protocols designed till date are based on password. Normally, password is used as a first authentication factor, where as other two factors are included according to the level of security requirements. In this paper, analysis of 3-factor based protocols is done on the basis of wrong password input and stolen smart card vulnerabilities. Paper also suggest the improvements to control these vulnerabilities.
- Subjects :
- Password
Challenge-Handshake Authentication Protocol
Password policy
User authentication
Authentication
Cognitive password
computer.internet_protocol
Computer science
business.industry
Multi-factor authentication
Computer security
computer.software_genre
One-time password
Chip Authentication Program
Password strength
S/KEY
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
3-D Secure
Authentication protocol
HMAC-based One-time Password Algorithm
Smart card
Challenge–response authentication
business
computer
Data Authentication Algorithm
Subjects
Details
- ISSN :
- 09758887
- Volume :
- 76
- Database :
- OpenAIRE
- Journal :
- International Journal of Computer Applications
- Accession number :
- edsair.doi...........8b884a546dcff2ee9b3929e58371addb